Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Interpol Nets 94 Arrests in Major Cybercrime Sweep

March 13, 2026

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

March 13, 2026

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Facebook X (Twitter) Instagram
Friday, March 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Law Enforcement Dismantles SocksEscort Proxy Network
News

Law Enforcement Dismantles SocksEscort Proxy Network

Team-CWDBy Team-CWDMarch 13, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


International law enforcement partners have executed Operation Lightning and dismantled malicious proxy service ‘SocksEscort.’

The proxy service is alleged to have compromised over 360,000 routers and internet of things (IoT) devices in163 countries since 2020 and offered ‘SocksEscort’ customers over 35,000 proxies in recent years.

As of February 2026, the SocksEscort application listed approximately 8000 infected routers to which its customers could buy access, of those, 2500 were in the US, a US Department of Justice (DoJ) statement said.

The malware allowed SocksEscort to direct internet traffic through the infected routers, which belonged to both businesses and individuals globally.

The malware-infected routers enabled cybercriminals to conceal their true originating IP addresses and locations, which furthered frauds like takeovers of US banks and cryptocurrency accounts and fraudulent unemployment insurance claims.

SocksEscort also enabled other criminal activities, including ransomware, distributed denial-of-service (DDoS) attacks and the distribution of child sexual abuse material (CSAM).

To get access to the proxy service, customers had to use a payment platform that made it possible to anonymously purchase the service using cryptocurrency. It is estimated that this payment platform received almost $6m from proxy service customers.

To protect against such exploits, router users, and vendors are advised to update the firmware of their devices regularly.

During the action day on March 11, law enforcement agencies successfully took down and seized 34 domains as well as 23 servers located in seven countries.

The US also froze $3.5m in cryptocurrency.

Law enforcement agencies involved in Operation Lightning included those from the US, Austria, France and the Netherlands. The European Union Agency for Criminal Justice, Eurojust, was also involved.

On the action day, Europol hosted a Virtual Command Post in its premises in The Hague, the Netherlands, to facilitate coordination between all partners.

Lumen Technologie’s Black Lotus Labs and the Shadowserver Foundation both provided assistance during the investigation and operation.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleEuropol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
Next Article APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Team-CWD
  • Website

Related Posts

News

Interpol Nets 94 Arrests in Major Cybercrime Sweep

March 13, 2026
News

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

March 13, 2026
News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

How cybercriminals are targeting content creators

November 26, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.