SocksEscort Cybercrime Proxy Network Taken Down in Operation Lightning, Tens of Servers and Domains Seized

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Global Coordination: Law enforcement dismantled the SocksEscort proxy network via Operation Lightning, seizing servers and domains in seven countries.
  • Financial Impact: The infrastructure facilitated tens of millions of dollars in residential proxy fraud, leveraging the AVRecon botnet to compromise SOHO routers.
  • Asset Seizure: Authorities successfully froze $3.5 million in cryptocurrency linked to the operation, severely disrupting the threat actors' financial operations.

The SocksEscort proxy network was dismantled in an international law enforcement initiative dubbed Operation Lightning, which resulted in the seizure of 34 domains and 23 servers across seven countries. This intervention also resulted in the freezing of approximately $3.5 million in illicit cryptocurrency assets, as per Europol. 

Federal investigators attribute tens of millions of dollars in global financial losses directly to the exploitation of this proxy network.

SocksEscort Residential Proxy Fraud

SocksEscort operated by hijacking small-office and home-office (SOHO) routers utilizing the AVRecon botnet. Threat actors deployed this malware to remotely control compromised devices and route malicious traffic through legitimate residential internet connections, according to a U.S. Justice Department (DOJ) press release. 

AVRecon campaign example | Source: Lumen Technologies
AVRecon campaign example | Source: Lumen Technologies

By selling access to roughly 369,000 unique IP addresses since 2020, the operators facilitated extensive residential proxy fraud. As of February 2026, the SocksEscort application listed approximately 8,000 infected routers for sale, of which 2,500 were in the U.S.

The compromised devices were infected through a vulnerability in the residential modems of a specific brand, " according to Europol.

Global distribution of the bots | Source: Lumen Technologies
Global distribution of the bots | Source: Lumen Technologies

The DOJ said the cybercrime network, dismantled by authorities from the FBI, alongside partners in Austria, France, and the Netherlands, previously maintained a customer base of approximately 124,000 users who used the infrastructure to obscure their true locations during malicious online activities that affected thousands of U.S. persons, businesses, and financial institutions.

This illicit routing architecture enabled downstream criminals to execute takeovers of U.S. bank and cryptocurrency accounts, fraudulent unemployment insurance claims, ransomware, DDoS attacks, and the distribution of child sexual abuse material (CSAM), Europol said. Examples of victims defrauded include:

Critical Cybersecurity Implications for Enterprise Hardware

The proliferation of illicit proxy services relies heavily on outdated or unpatched consumer-grade routers, highlighting persistent vulnerabilities within edge networking equipment. To mitigate the risk of hardware co-optation by botnets like AVRecon – a Remote Access Trojan (RAT) – Lumen security professionals advise:

In other recent news, the KadNap botnet hijacked Asus routers to serve as malicious proxies, comprising over 14,000 devices. Reports early last month suggested SystemBC infections exceed 10,000, including systems linked to government hosting.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: