US and Europe disrupt SocksEscort proxy network

Law enforcement agencies from the United States and Europe, supported by private partners, have taken down the SocksEscort cybercrime proxy network. This service, powered by the AVRecon malware infecting Linux-based devices, provided cybercriminals with access to compromised IP addresses. The operation resulted in the seizure of domains, servers, and cryptocurrency assets.

The disruption of the SocksEscort proxy network occurred on March 12, 2026, involving coordination between U.S. authorities, European law enforcement, and private entities like Lumen’s Black Lotus Labs (BLL).

SocksEscort operated for over a decade, first documented by BLL in 2023. It relied exclusively on edge devices compromised by the AVRecon malware, which targeted Linux-based small office/home office (SOHO) routers. AVRecon has been active since at least May 2021 and infected more than 70,000 such devices by mid-2023. The network maintained an average of 20,000 infected devices weekly in recent years, with over half located in the United States and the United Kingdom.

Since the summer of 2020, SocksEscort offered access to approximately 369,000 different IP addresses, advertised as “clean” from major ISPs including Comcast, Spectrum, Spectrum Business, Verizon, and Charter. These addresses could evade multiple blocklists. As of February 2026, the service listed about 8,000 infected routers available for customer access, including 2,500 in the United States.

The U.S. Department of Justice (DOJ) highlighted the network's role in specific crimes: it facilitated the theft of $1 million in cryptocurrency from a New York user, enabled $700,000 in losses from defrauding a Pennsylvania-based manufacturing business, and caused $100,000 in damages through fraud affecting current and former U.S. service members using MILITARY STAR cards.

In the operation, European authorities in Austria, France, and the Netherlands, coordinated by Europol, seized 34 domains and 23 servers across seven countries. The U.S. froze $3.5 million in cryptocurrency. All infected devices connected to SocksEscort have now been disconnected from the service.

Lumen's earlier efforts in 2023 disrupted AVRecon by null-routing its command-and-control infrastructure, but operators later restored functionality using 15 such nodes. Since the beginning of 2025, BLL observed 280,000 unique victim IP addresses linked solely to this malware for expanding SocksEscort.

Liittyvät artikkelit

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI:n luoma kuva

Researchers discover SSHStalker botnet infecting Linux servers

Raportoinut AI AI:n luoma kuva

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Saksan poliisi ja Europol sulkivat noin 373 000-400 000 pimeän verkon sivustoa, joilla myytiin törkeää lasten hyväksikäyttöä koskevaa materiaalia ja huijauksia operaatio Alicessa. Viittä ruotsalaismiestä epäillään törkeästä lapsipornografiasta Saksan poliisin vihjeen perusteella. Viisi vuotta kestäneessä tutkinnassa tunnistettiin 440 asiakasta.

Raportoinut AI

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Raportoinut AI

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

The U.S. Department of the Treasury has sanctioned a Russian exploit brokerage network accused of buying stolen U.S. government cyber tools with cryptocurrency and reselling them. This marks the first use of authorities under the Protecting American Intellectual Property Act. The network, led by Sergey Sergeyevich Zelenyuk, obtained at least eight proprietary tools from a U.S. defense contractor.

Raportoinut AI

Brazilian authorities have dismantled a money-laundering operation linked to China and the powerful PCC crime syndicate, involving US$190 million in illicit funds. The scheme used a Chinese e-commerce platform to sell consumer electronics while concealing revenues and laundering drug proceeds. Prosecutors allege the network evaded taxes and funneled money through fake companies.

 

 

 

Tämä verkkosivusto käyttää evästeitä

Käytämme evästeitä analyysiä varten parantaaksemme sivustoamme. Lue tietosuojakäytäntömme tietosuojakäytäntö lisätietoja varten.
Hylkää