SocksEscort Dismantled: Inside the 16-Year Criminal Proxy Network That Infected 369,000 Routers
When the DOJ, Europol, and an international coalition of law enforcement agencies seized the SocksEscort domain on March 12, 2026, they didnāt just shut down another botnet. They ripped out a piece of criminal infrastructure that had been running continuously since 2009 ā 16 years of providing anonymity to fraudsters, ransomware operators, bank account thieves, and worse.
The numbers are staggering: 369,000 infected routers and IoT devices across 163 countries. Over 35,000 active proxies available at any time. An estimated 124,000 paying criminal customers over the networkās lifetime. And for most of those 16 years, the router owners had absolutely no idea their home internet connections were being sold to criminals.
SocksEscort wasnāt a hacking tool. It was the invisibility cloak that made other crimes possible.
What SocksEscort Actually Did
To understand why this takedown matters, you need to understand what a criminal proxy service is and why itās the single most important piece of infrastructure in modern cybercrime.
The Problem Every Criminal Faces
Every internet connection has an IP address. Every fraud attempt, bank account takeover, and ransomware operation leaves a trail of IP addresses in server logs. If a criminal in Russia tries to log into an Americanās bank account, the bankās fraud systems immediately flag the login as suspicious ā wrong country, wrong IP range, wrong everything.
The SocksEscort Solution
SocksEscort solved this problem by turning hundreds of thousands of ordinary home routers into proxy servers. When a criminal customer needed to appear as if they were logging in from Denver, SocksEscort routed their traffic through an infected router in Denver. The bankās fraud detection systems saw a local IP address. The login looked legitimate.
Hereās how it worked:
- Infection: Routers and IoT devices were infected with malware called AVRecon ā a purpose-built Trojan that turned consumer routers into proxy nodes without their ownersā knowledge
- Enrollment: Infected devices were automatically added to the SocksEscort network and made available to paying customers
- Sale: Criminal customers purchased proxy access through the SocksEscort website, selecting proxies by geographic location, ISP, and connection type
- Abuse: Customers routed their criminal traffic through the infected devices, making their activity appear to originate from legitimate residential connections
The result: your grandmotherās router in Ohio could have been the launchpad for a bank account takeover, a fraudulent unemployment claim, or a ransomware negotiation ā and neither she nor anyone else would know.
What Crimes SocksEscort Enabled
According to the DOJ and Europol, the proxy network facilitated:
- Bank and cryptocurrency account takeovers ā Criminals logged into victimsā financial accounts through local residential IPs to bypass fraud detection
- Fraudulent unemployment insurance claims ā During the COVID-era fraud explosion, SocksEscort proxies made fake claims appear to originate from the right geographic locations
- Ransomware operations ā Operators used the network to obscure their command-and-control communications
- DDoS attacks ā The botnetās massive scale made it useful for distributed denial-of-service campaigns
- Distribution of child sexual abuse material (CSAM) ā Europol specifically flagged this as one of the criminal activities facilitated by the network
The DOJ says these crimes cost Americans āmillions of dollarsā ā almost certainly an understatement given the networkās 16-year operational history and 124,000 customer base.
The Takedown: Operation Details
The takedown was a coordinated international effort:
- 34 domains seized associated with SocksEscortās operations
- 23 servers seized across seven countries
- Infected routers disconnected from the proxy service
- SocksEscort website replaced with a law enforcement seizure notice
The Scale at Shutdown
While SocksEscort had infected over 369,000 devices over its lifetime, the networkās active size fluctuated. According to cybersecurity firm Black Lotus Labs, which tracked SocksEscort and assisted law enforcement:
- 280,000 routers were part of the botnet as of January 2026
- 8,000 active routers as of February 2026 (suggesting pre-takedown disruption had already reduced the network)
- 2,500 of those were in the United States
- Over half of all victims were located in the U.S. or U.K.
Black Lotus Labs called SocksEscort āone of the largest botnets targeting small-office/home-office (SOHO) routers seen in recent history.ā
A 16-Year History
The timeline of SocksEscort tells its own story:
- 2009: SocksEscort launched as a Russian-language service selling access to compromised computers (first documented by cybersecurity journalist Brian Krebs)
- 2009-2023: The service operated largely uninterrupted, evolving from compromised PCs to residential routers as its primary proxy infrastructure
- 2023: Black Lotus Labs publicly identified the AVRecon malware and SocksEscort connection, calling it one of the largest SOHO router botnets ever observed
- 2023-2026: Despite public exposure, the network continued operating for three more years
- March 12, 2026: International law enforcement finally seized the infrastructure and shut down operations
The 17-year gap from inception to shutdown is the real story. This wasnāt a case of law enforcement being unaware ā SocksEscort was publicly documented as early as 2023. The challenge was the international coordination, legal authority, and technical capability required to dismantle a network spanning 163 countries.
Why Proxy Networks Are the Backbone of Cybercrime
SocksEscort wasnāt unique. It was one node in a larger ecosystem of criminal proxy services that form the invisible infrastructure layer of modern cybercrime. Without residential proxy networks, most online fraud becomes dramatically harder to execute.
Think of it this way:
- Phishing gets you the credentials
- Malware gets you the access
- Proxy networks make it all look legitimate
When law enforcement takes down a phishing campaign, the criminals set up a new one in hours. When they seize a malware C2 server, operators switch to backup infrastructure. But residential proxy networks ā built on hundreds of thousands of infected consumer devices ā take years to build and are extraordinarily difficult to replace.
The Connection to Other Takedowns
SocksEscortās shutdown didnāt happen in isolation. In the same month:
- INTERPOLās Operation Synergia III dismantled 45,000 malicious IPs across 72 countries (read our full coverage)
- FBI, Meta, and Thai Police disrupted Southeast Asian scam centers, disabling 150,000 accounts and arresting 21 suspects
- Operation Moonlander (February 2026) took down the Anyproxy and 5socks services ā another residential proxy botnet that had been operating for nearly 20 years
This isnāt coincidence. These operations represent a coordinated global assault on the infrastructure layer that enables scams, fraud, and cybercrime at scale. Take away the proxies, and criminals canāt hide. Take away the servers, and criminals canāt operate. Take away the social media accounts, and criminals canāt reach victims.
Is Your Router Infected?
If you own a home router ā especially an older model ā itās worth checking whether your device might have been part of SocksEscort or a similar botnet.
Warning Signs
- Unusually slow internet that isnāt explained by your ISP or the number of devices on your network
- Unexpected bandwidth usage visible in your routerās admin interface
- Your IP address appearing in abuse databases ā check at AbuseIPDB or Shodan
- Unfamiliar outbound connections in your routerās connection logs
What to Do
- Reboot your router. Many router botnets, including AVRecon, donāt survive a reboot. This is the simplest first step.
- Update your router firmware. Log into your routerās admin panel and check for firmware updates. Many infections exploit known vulnerabilities that have been patched.
- Change default credentials. If youāve never changed your routerās admin password from the factory default, do it now.
- Consider replacing old hardware. Routers more than 5 years old often no longer receive security updates. If your router is end-of-life, itās a permanent security risk.
- Disable remote management. Unless you specifically need to manage your router from outside your network, turn off remote administration features.
The Bigger Picture
SocksEscort ran for 16 years. It survived public exposure in 2023. It served 124,000 criminal customers. And it only fell because an international coalition of law enforcement agencies coordinated across seven countries to seize its infrastructure simultaneously.
The takedown is a victory. But itās also a reminder of how long criminal infrastructure can operate when itās distributed across hundreds of thousands of consumer devices in 163 countries. For every SocksEscort that gets taken down, others continue to operate in the shadows.
The criminal proxy ecosystem isnāt gone. But it just got significantly more expensive and risky to operate. And for the hundreds of thousands of router owners whose devices were unknowingly enlisted in a criminal enterprise ā their connections are finally their own again.
Sources
- U.S. Department of Justice, āAuthorities Dismantle Global Malicious Proxy Service,ā March 13, 2026
- Europol, āEuropol and international partners disrupt āSocksEscortā proxy service,ā March 13, 2026
- TechCrunch, āLaw enforcement shuts down botnet made of tens of thousands of hacked routers,ā March 12, 2026
- The Hacker News, āAuthorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries,ā March 13, 2026
- Tomās Hardware, āDoJ dismantles SocksEscort proxy network,ā March 14, 2026
- Black Lotus Labs/Lumen Technologies, āEscorted Out,ā March 2026
- Help Net Security, āAuthorities dismantle SocksEscort proxy network behind millions in fraud,ā March 13, 2026



