A major international law enforcement operation has successfully dismantled the SocksEscort malicious proxy network, a sprawling cybercriminal infrastructure that infected hundreds of thousands of home and small‑business routers worldwide. The takedown cuts off a long‑running service that enabled attackers to hide their identities, bypass fraud detection systems, and steal millions of dollars from victims across the United States and abroad.
What Was SocksEscort? A Global Criminal Proxy-for-Hire Network
SocksEscort operated as a residential proxy service, secretly converting vulnerable internet routers into traffic‑forwarding nodes for paying cybercriminal customers. The routers were infected with malware—identified in some reporting as AVRecon—which allowed attackers to route their malicious traffic through legitimate residential IP addresses.
Scale of the Operation
- ~369,000 IP addresses offered for sale since 2020
- 8,000 infected routers available as of Feb 2026
- 2,500 compromised routers located in the U.S.
Routers across 163 countries were compromised, creating one of the world’s largest criminal proxy networks.
By masking their true IP addresses behind these infected residential devices, criminals were able to evade geolocation‑based security controls and appear as legitimate users.
How the Malware-Enabled Proxy Network Worked
According to the U.S. Department of Justice, SocksEscort operators deployed malware onto home and small business routers, converting them into covert relay nodes.
Once infected:
- The router secretly forwarded internet traffic for SocksEscort customers.
- Cybercriminals purchased access to these IPs using cryptocurrency payment platforms.
- Their activity—such as account takeovers or fraud—appeared to originate from legitimate residential locations.
The setup provided attackers with high‑trust consumer IP addresses, helping them bypass fraud prevention systems designed to flag suspicious login locations or automated activity.
Cybercrimes Linked to SocksEscort
Authorities say the network was used to facilitate large‑scale fraud schemes, including:
- Bank account takeovers
- Cryptocurrency account theft
- Unemployment insurance fraud
- Financial scams targeting U.S. citizens and businesses
Confirmed Victim Losses
- $1 million stolen from a New York crypto exchange customer
- $700,000 stolen from a Pennsylvania manufacturing company
- $100,000 drained from MILITARY STAR card accounts belonging to U.S. service members
Officials believe these cases represent only a fraction of the damage.
Europol also confirmed the infrastructure was abused for:
- Ransomware operations
- DDoS attacks
- Distribution of illegal content (including CSAM)
International Operation “Lightning” Takes Down the Infrastructure
The coordinated takedown of SocksEscort—known as Operation Lightning—involved a broad coalition of agencies, including the:
- U.S. Department of Justice
- FBI Sacramento Field Office
- Defense Criminal Investigative Service (DoD OIG)
- IRS Criminal Investigation
- Europol & Eurojust
- Law enforcement from Austria, France, Netherlands, Germany, Hungary, Romania, and Bulgaria
Key Actions Executed
- Seizure of 34 domains associated with the service
- Shutdown of 23 servers across seven countries
- Freezing of $3.5 million in cryptocurrency tied to the botnet
Critical Support From Cybersecurity Intelligence Teams
The DOJ credited:
- Lumen’s Black Lotus Labs
- Shadowserver Foundation
for providing technical intelligence used to track and disrupt the proxy infrastructure.
These organizations previously identified the AVRecon malware, mapped SocksEscort’s command‑and‑control systems, and tracked infection clusters across the globe.
Why Residential Proxy Botnets Are a Growing Threat
Residential proxy networks have become increasingly attractive to cybercriminals because they provide:
- High anonymity
- Believable IP reputations
- Low chance of detection
Instead of relying on traditional VPNs or Tor—often blocked by security tools—attackers can route activity through everyday home routers, making fraud detection systems far less effective.
SocksEscort’s takedown highlights a dangerous trend: malware‑infected consumer devices being monetized at scale as cybercriminal infrastructure.
The Investigation Continues
Authorities emphasize that the takedown is only the first step. Investigators are still:
- Analyzing seized servers
- Tracing financial flows
- Identifying individuals responsible for operating the service
Given the network’s global footprint and years‑long operation, additional arrests and infrastructure seizures may follow.
Conclusion
The dismantling of the SocksEscort proxy network marks one of the most significant law enforcement actions against a residential malware proxy service to date. By infecting routers across 163 countries and selling access to 369,000 IP addresses, the network enabled massive fraud, identity theft, and cybercrime at a global scale.
Operation Lightning not only shut down a major criminal marketplace but also demonstrated the power of international collaboration between law enforcement and cybersecurity researchers in combating complex, distributed cyber threats.
As authorities continue to unravel the network’s operators and customers, the case serves as a powerful reminder: compromised consumer hardware is becoming one of the most valuable—and dangerous—assets in the cybercrime economy.