- An international law enforcement operation called Operation Lightning has dismantled the SocksEscort proxy service, a botnet made from over 8,000 compromised residential routers.
- The criminal service, active since at least 2020, enabled fraud allowing attackers to hide their locations, leading to theft including a $1 million cryptocurrency exchange customer loss.
- Authorities seized 34 domains, 23 servers, and froze $3.5 million in cryptocurrency, while investigating a payment platform that received over ~$5.4 million in funds.
- The botnet was powered by AVrecon malware, which infected devices through critical router vulnerabilities, permanently compromising them with a custom firmware flash.
An international consortium of law enforcement agencies has successfully dismantled a major criminal proxy service, known as SocksEscort, which enslaved thousands of residential and small business routers into a global botnet to facilitate large-scale fraud. The court-authorized operation, named Operation Lightning by Europol, involved authorities from the United States and seven European nations.
The U.S. Department of Justice (DoJ) stated that the service infected devices with malware, allowing it to sell access to tunnel internet traffic through them. Consequently, SocksEscort offered access to roughly 369,000 different IP addresses across 163 countries, listing nearly 8,000 infected routers as recently as February 2026.
The primary victims of fraud enabled by this service included a cryptocurrency exchange customer in New York, who lost $1 million, and a Pennsylvania manufacturing business defrauded of $700,000. Meanwhile, Europol said the compromised routers facilitated crimes like ransomware, DDoS attacks, and the distribution of CSAM.
The operation resulted in the takedown of 34 domains and 23 servers located across seven countries. Furthermore, authorities have frozen $3.5 million in cryptocurrency linked to the service, which customers paid for using an anonymous platform that processed over ~$5.4 million (EUR 5 million).
The technical backbone of the operation was the AVrecon malware, which Lumen Black Lotus Labs first documented in July 2023. According to a U.S. Federal Bureau of Investigation alert, the malware exploited critical vulnerabilities in roughly 1,200 device models from brands like Cisco and Netgear.
To achieve permanent infection, threat actors used the device’s update mechanism to flash a custom firmware image. This action effectively disabled the device’s own update and flashing features, thereby making remediation extremely difficult for victims.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- US Gas Prices Hit 2-Year High as Iran Conflict Shuts Key Oil Route
- Adobe CEO Steps Down Amid AI-Driven Leadership Shifts
- MEV bot sandwiches user for millions in $50M swap
- White House Demands ABC News Retract Iran Drone Report
- Robinhood Crypto Volumes Leap 74% as Bitcoin Holds Strong
