TLDR
- International authorities successfully dismantle SocksEscort through coordinated operation targeting 34 domains and 23 servers.
- Criminal proxy network compromised 369,000 routers spanning 163 nations worldwide.
- Law enforcement freezes $3.5 million in digital assets linked to illicit proxy service.
- AVRecon malware served as backbone for network facilitating ransomware, fraud, and distributed denial-of-service attacks.
- Operation demonstrates unprecedented international cooperation in combating sophisticated cybercrime infrastructure.
A coordinated international law enforcement operation successfully dismantled SocksEscort, a sophisticated criminal proxy service that hijacked hundreds of thousands of routers worldwide. Europol, working alongside U.S. Department of Justice officials, brought down the massive infrastructure that had compromised more than 369,000 devices across 163 nations. The operation resulted in domain seizures, server confiscations, and the freezing of $3.5 million in cryptocurrency, effectively terminating one of the world’s largest IP anonymization schemes.
Authorities successfully disconnected the compromised modems from the criminal network, rendering the service inoperable. Notifications regarding the infected routers are being distributed to relevant national authorities for appropriate remediation measures. This collaborative international enforcement action represents a landmark victory in the ongoing battle against transnational cybercriminal enterprises.
The SocksEscort platform provided criminals with anonymity while conducting various illegal activities including financial fraud, ransomware deployment, and cyber-extortion. Operating as a paid service, the network made available more than 35,000 proxy connections to paying customers seeking illicit access. According to investigators, this IP masking infrastructure enabled numerous large-scale cyberattacks and significant financial losses for victims.
Unprecedented Scale of Router-Based Proxy Network Uncovered
Forensic analysis revealed SocksEscort’s operations extended throughout 163 countries, primarily targeting residential and small business networking equipment. The sophisticated malware redirected internet traffic through compromised devices, effectively concealing the true IP addresses of criminal actors. Investigation teams documented thousands of victimized devices in both the United States and United Kingdom, underscoring the operation’s massive international footprint.
Threat actors leveraged this network infrastructure to gain unauthorized access to banking platforms and cryptocurrency wallets, while also submitting fraudulent insurance and financial claims. Authorities documented at least one U.S. victim who suffered approximately $1 million in cryptocurrency losses attributable to these attacks. Intelligence suggests the criminal enterprise commenced operations around 2020 and experienced exponential growth thereafter.
By February 2026, the SocksEscort service had expanded to approximately 8,000 compromised routers, with roughly 2,500 located within U.S. borders. Security researchers at Black Lotus Labs conducted extensive monitoring of the botnet, ultimately identifying the AVRecon malware as the primary infection vector. This criminal infrastructure represented a critical threat to global cybersecurity frameworks.
Coordinated International Enforcement Action Neutralizes Threat
The joint operation spearheaded by Europol and the DOJ resulted in the seizure of 34 domain names and 23 physical servers distributed across seven countries. U.S. law enforcement agencies successfully froze $3.5 million in cryptocurrency assets directly tied to SocksEscort financial transactions. The compromised devices have been systematically disconnected, eliminating the operational infrastructure that enabled the IP masking service.
International partners are receiving comprehensive notifications to facilitate continued investigations and potential prosecutions within their jurisdictions. This enforcement action exemplifies the power of coordinated international cooperation in neutralizing sophisticated cybercrime operations. The disruption of this router-based proxy network will substantially hamper similar criminal activities in the foreseeable future.
SocksEscort’s primary infection targets were small-office/home-office (SOHO) routers, which criminals exploited to execute precisely targeted fraud campaigns. Law enforcement confirmed the proxy infrastructure facilitated ransomware distribution, distributed denial-of-service attacks, and the trafficking of illegal digital content. The takedown of SocksEscort eliminates one of the most extensive criminal IP masking operations documented in recent cybersecurity history.





