The malicious service compromised thousands of home and small business routers worldwide, enabling cybercriminals to mask their identities while executing large-scale financial fraud.
The coordinated takedown resulted in the seizure of dozens of U.S.-registered internet domains and the dismantling of server infrastructure across multiple countries.
According to unsealed court documents, the SocksEscort infrastructure relied on deploying malware directly onto vulnerable internet routers.
Once infected, these devices were quietly transformed into nodes within a massive proxy network. The operators behind SocksEscort then sold this access to other cybercriminals.
By routing their malicious traffic through compromised home and business networks, attackers could hide their true originating IP addresses and physical locations.
Because residential IP addresses generally have high trust reputations, this tactic enabled attackers to bypass standard geographic blocking and security filters easily.
The scale of the operation was extensive:
The anonymity provided by SocksEscort fueled severe cyber-enabled crimes, including bank account takeovers, fraudulent unemployment insurance claims, and large-scale cryptocurrency theft.
The financial toll on American citizens and businesses reached into the millions.
Notable incidents linked to the proxy network include:
Disrupting the botnet required extensive global teamwork. The U.S. government seized related domains, while law enforcement in Austria, France, and the Netherlands took down the physical servers that supported the SocksEscort network.
The FBI Sacramento Field Office, the IRS Criminal Investigation unit, and the Department of Defense spearheaded the investigation.
It also involved heavy collaboration with Europol, Eurojust, and authorities across Germany, Bulgaria, Hungary, and Romania.
Private sector researchers from Lumen’s Black Lotus Labs and the Shadowserver Foundation provided crucial threat intelligence to support the takedown.
According to court documents, experts recommend mitigation steps to prevent networks from being recruited into SocksEscort proxy botnets.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Authorities Dismantle Malicious Proxy Service Used to Deploy Malware Attacking Thousands of Users appeared first on Cyber Security News.
Arrow Nav Tabs is a CSS component that renders animated, arrow-shaped navigation tabs for site…
VanillaJCrop is an image cropping library that replaces the classic JCrop jQuery plugin in pure…
jsGantt is a customizable, flexible, multilingual Gantt Chart component built with vanilla JavaScript. It uses…
Sony Pictures announced at CinemaCon on Monday that they are making an R-rated animated feature…
LANSING, MI (WOWO) Growing concerns about student performance are prompting calls to rethink how high…
GROSSE POINTE FARMS, MI (WOWO) Police and school officials in southeast Michigan are warning high…
This website uses cookies.