The operation was led by the U.S. Department of Justice (DOJ) and involved multiple global law enforcement agencies.
Authorities say the network infected thousands of internet routers worldwide with malware and allowed criminals to route their traffic through these compromised devices.
This enabled attackers to disguise their true locations and carry out fraud attacks that caused millions of dollars in financial losses to individuals, businesses, and financial institutions in the United States.
According to court documents, the SocksEscort operation targeted home and small business routers. Malware was installed on vulnerable devices, turning them into nodes in a large residential proxy network.
Once infected, these routers could secretly forward internet traffic for paying customers of the SocksEscort service.
This setup allowed cybercriminals to conduct illegal activity using the IP addresses of compromised routers, making their actions appear legitimate and harder for investigators to trace.
Since summer 2020, SocksEscort has reportedly offered access to approximately 369,000 IP addresses across the globe.
As of February 2026, the service still had about 8,000 infected routers available, including 2,500 located in the United States.
Investigators say criminals used the SocksEscort proxy network to support a variety of cyber-enabled fraud schemes.
By masking their real IP addresses, attackers could bypass security systems designed to detect suspicious login attempts or abnormal geographic activity.
Some of the crimes linked to the network include:
Authorities highlighted several major cases connected to the operation:
Officials say these incidents represent only a portion of the financial damage caused by the network.
The disruption operation involved multiple international law enforcement partners. Authorities in Austria, France, and the Netherlands successfully seized and shut down several SocksEscort servers.
In the United States, investigators executed court-authorized seizure warrants against dozens of domains believed to be connected to the criminal proxy service.
The investigation was led by the FBI Sacramento Field Office, with support from:
Additional assistance came from Europol, Eurojust, and law enforcement agencies in several countries, including Germany, Hungary, Romania, Bulgaria, and Austria.
Cybersecurity organizations also played a critical role in identifying and tracking the malicious infrastructure.
The DOJ credited Lumen’s Black Lotus Labs and the Shadowserver Foundation for providing technical intelligence that helped investigators disrupt the network.
The Justice Department also worked with its International Computer Hacking and Intellectual Property (ICHIP) program to coordinate cybercrime investigations across multiple jurisdictions.
Officials say the takedown highlights the growing threat posed by residential proxy networks powered by compromised devices.
Such networks are increasingly used by cybercriminals to evade detection and launch fraud, credential theft, and other malicious campaigns.
The investigation remains ongoing, and authorities continue to analyze the infrastructure to identify those responsible for operating the SocksEscort network.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Authorities Shut Down Malicious Proxy Network Used to Spread Malware appeared first on Cyber Security News.
April 13, 2026 What’s the market in Sioux Falls for a residential home lot priced…
AMILabs.xyz – Gandi customer – (United States) Forward-looking AI research labs and developers use .xyz…
?si=sPXB5teJO7wsm71F The Pacific Palisades fire of January 25 destroyed much of that coastal Los Angeles…
Patriots Point Naval & Maritime Museum now offers tickets for its yearly Independence Day fireworks…
Patriots Point Naval & Maritime Museum now offers tickets for its yearly Independence Day fireworks…
United Community Corporation cut the ribbon on Wednesday, April 8, at 12:30 p.m. A new…
This website uses cookies.