US and European authorities disrupt SocksEscort proxy network tied to AVRecon Linux malware


US and European authorities have disrupted SocksEscort, a long-running criminal proxy service that routed malicious traffic through hacked routers and other edge devices. The takedown targeted infrastructure used to sell access to infected residential and small-business devices, while officials said all infected devices used in the service have now been disconnected.

The operation was backed by the US Department of Justice, Europol, and private-sector partners including Lumen’s Black Lotus Labs. Europol said authorities seized 34 domains and 23 servers across seven countries during the action day, while US authorities also froze $3.5 million in cryptocurrency.

Investigators say SocksEscort worked by abusing compromised routers and IoT devices, then selling that access as a proxy service to criminals who wanted “clean” residential IP addresses. The DOJ said the service had offered access to about 369,000 IP addresses since the summer of 2020, and that the SocksEscort application still listed roughly 8,000 infected routers in February 2026, including 2,500 in the United States.

Lumen’s Black Lotus Labs tied the network to AVRecon, a Linux malware strain first detailed in 2023. The researchers said SocksEscort had maintained an average of about 20,000 infected devices each week for the last few years, and that they observed 280,000 distinct victim IP addresses since early 2025.

What authorities say happened

ItemConfirmed detail
Service disruptedSocksEscort proxy network
Malware behind itAVRecon
Domains seized34
Servers seized23
Countries involved in server action7
Crypto frozen$3.5 million
IPs offered since 2020About 369,000
Infected routers listed in Feb. 2026About 8,000
US routers in Feb. 2026About 2,500

The DOJ says SocksEscort enabled multiple fraud schemes that caused major losses. Those included the theft of $1 million in cryptocurrency from a New York victim, $700,000 in losses tied to fraud against a Pennsylvania manufacturing business, and about $100,000 in damages in a fraud case involving MILITARY STAR card holders.

Europol described the network as a malicious proxy service built on infected routers and IoT devices across 163 countries. The agency said the service gave customers access to more than 35,000 proxies and was used in cybercrime including fraud, ransomware, DDoS attacks, and the distribution of child sexual abuse material.

Number of Socksescort victims over time
Source: Black Lotus Labs

How the botnet worked

According to an FBI and CISA joint advisory, SocksEscort operators exploited known vulnerabilities in routers and IoT devices, then installed AVRecon malware to maintain remote access and fold those devices into a botnet. That let the operators monetize the hacked hardware by reselling proxy access to criminals who wanted to hide their real IP addresses.

Black Lotus Labs says AVRecon appears to have been used only to grow SocksEscort, not to feed other botnets or services. The researchers also said the operators kept their command-and-control infrastructure unusually quiet, which helped the service persist after earlier disruption attempts.

That long lifespan is one reason this case matters. SocksEscort was not a short-lived malware campaign. Officials and researchers describe it as a service that ran for years, constantly replenished with compromised edge devices that looked like ordinary home or small-business internet connections.

The botnet’s victims’ location
Source: Black Lotus Labs

Why this takedown matters

  • It hit both the criminal storefront and the underlying infrastructure
  • It cut off access to thousands of infected routers
  • It targeted a proxy service that helped criminals blend into legitimate residential traffic
  • It shows how vulnerable older routers and IoT gear remain

The case also highlights a broader security problem. Attackers continue to target Linux-based routers and edge devices because many stay online for years without updates, run default settings, or reach end of life without being replaced. That makes them ideal building blocks for proxy botnets and fraud infrastructure. This is an inference supported by the government advisory’s mitigation guidance and the scale of infections described by DOJ and Europol.

How to reduce the risk of router compromise

  • Replace routers and edge devices that have reached end of life
  • Install the latest available firmware updates
  • Change default administrator passwords
  • Disable remote administration if you do not need it
  • Watch for official guidance from your vendor or ISP

These are the steps recommended in the joint US advisory tied to the operation.

FAQ

What was SocksEscort?

SocksEscort was a criminal proxy service that sold access to compromised routers and IoT devices so customers could route traffic through residential or small-business IP addresses.

What malware powered the network?

Researchers and law enforcement tied the network to AVRecon, a Linux malware family used to compromise routers and maintain remote access.

How big was the operation?

The DOJ said SocksEscort had offered access to about 369,000 IP addresses since 2020. Europol said the compromised-device footprint spanned 163 countries.

What did authorities seize?

Europol said investigators took down and seized 34 domains and 23 servers in seven countries, while US authorities froze $3.5 million in cryptocurrency.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages