The malicious service compromised thousands of home and small business routers worldwide, enabling cybercriminals to mask their identities while executing large-scale financial fraud.
The coordinated takedown resulted in the seizure of dozens of U.S.-registered internet domains and the dismantling of server infrastructure across multiple countries.
According to unsealed court documents, the SocksEscort infrastructure relied on deploying malware directly onto vulnerable internet routers.
Once infected, these devices were quietly transformed into nodes within a massive proxy network. The operators behind SocksEscort then sold this access to other cybercriminals.
By routing their malicious traffic through compromised home and business networks, attackers could hide their true originating IP addresses and physical locations.
Because residential IP addresses generally have high trust reputations, this tactic enabled attackers to bypass standard geographic blocking and security filters easily.
The scale of the operation was extensive:
The anonymity provided by SocksEscort fueled severe cyber-enabled crimes, including bank account takeovers, fraudulent unemployment insurance claims, and large-scale cryptocurrency theft.
The financial toll on American citizens and businesses reached into the millions.
Notable incidents linked to the proxy network include:
Disrupting the botnet required extensive global teamwork. The U.S. government seized related domains, while law enforcement in Austria, France, and the Netherlands took down the physical servers that supported the SocksEscort network.
The FBI Sacramento Field Office, the IRS Criminal Investigation unit, and the Department of Defense spearheaded the investigation.
It also involved heavy collaboration with Europol, Eurojust, and authorities across Germany, Bulgaria, Hungary, and Romania.
Private sector researchers from Lumen’s Black Lotus Labs and the Shadowserver Foundation provided crucial threat intelligence to support the takedown.
According to court documents, experts recommend mitigation steps to prevent networks from being recruited into SocksEscort proxy botnets.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Authorities Dismantle Malicious Proxy Service Used to Deploy Malware Attacking Thousands of Users appeared first on Cyber Security News.
While this year’s Oscars ceremony saw big wins for Sinners, Hamnet, and KPop Demon Hunters,…
Invincible’s fourth season performs a much-needed reset, setting a definitive course for its character arcs…
The creator of the widely popular Gitleaks tool has launched a new open-source secrets scanner…
A threat group known as Konni APT has been caught running a multi-stage attack campaign…
Google is preparing to launch Android 17, bringing a comprehensive set of new APIs and…
Apple has just announced the AirPods Max 2 with better noise cancellation and sound quality.…
This website uses cookies.