back to top

Law Enforcement Dismantles SocksEscort Proxy Network Tied to Cryptocurrency Fraud.

Authorities Dismantle Global “SocksEscort” Proxy Service Behind Crypto‑Theft Operations

U.S., European and several other law‑enforcement agencies announced Thursday a coordinated takedown of SocksEscort, a malicious proxy platform that enabled cybercriminals to conceal their IP addresses while conducting fraud, including the illicit takeover of cryptocurrency accounts.


What was SocksEscort?

SocksEscort operated as a “sock‑proxy” service that rented out compromised internet‑connected devices—primarily routers—to criminals. By routing traffic through these hijacked nodes, the perpetrators could mask their true locations and evade detection. According to the U.S. Department of Justice (DOJ), the network had seized control of roughly 369,000 devices spread across 163 countries.

Since its emergence in 2020, the service has been linked to a range of illicit activities, from bank fraud to the theft of cryptocurrency holdings. Prosecutors highlighted a New York victim who lost close to $1 million in digital assets after his accounts were accessed through a SocksEscort proxy.

Scale of the Operation

  • Infrastructure: 34 domains were seized, and around two dozen servers located in seven nations were disabled.
  • Financial Footprint: The platform generated at least €5 million (approximately $5.7 million) in revenue from users who purchased access with anonymous cryptocurrency payments.
  • Crypto Seizures: Authorities frozen roughly $3.5 million worth of digital currencies tied to the operation.

International Collaboration

The takedown was the result of a multi‑jurisdictional effort involving:

Country Key Agencies
United States FBI Sacramento Field Office, Department of Defense Office of Inspector General’s Defense Criminal Investigative Service, IRS Criminal Investigation (Oakland)
Austria, France, Germany, Hungary, Netherlands, Romania National law‑enforcement bodies coordinated through Europol and Eurojust
Private Partners Black Lotus Labs (Lumen Technologies’ threat‑intelligence unit) and the non‑profit Shadowserver Foundation, which supplied technical data.

Europol Executive Director Catherine De Bolle emphasized that “proxy services like SocksEscort give criminals the digital cover they need to launch attacks, distribute illegal content and evade detection.” She added that cross‑border cooperation “exposes and dismantles the infrastructure behind cybercrime.”

Technical Insights

The proxy network relied on malware identified as AVrecon, a tool that was first documented publicly by Black Lotus Labs in July 2023. The malware allowed threat actors to infiltrate routers and other devices, converting them into exit nodes for illicit traffic.

Analysis

The removal of SocksEscort is a significant blow to the cyber‑crime ecosystem that leverages compromised hardware for anonymity. While the seizure of $3.5 million in cryptocurrency represents a tangible financial impact, the broader consequence lies in the disruption of a service that facilitated hundreds of fraud cases worldwide.

For the cryptocurrency community, the case underscores two persistent vulnerabilities:

  1. Anonymity vs. Accountability – The same anonymity that makes cryptocurrencies attractive to legitimate users also enables illicit actors to launder proceeds. Disrupting the anonymity infrastructure (e.g., proxy networks) can be an effective countermeasure.
  2. Supply‑Chain Risks – The exploitation of everyday IoT devices as proxy nodes highlights the need for stronger security standards across consumer hardware, as compromised devices become inadvertent participants in financial crimes.

Key Takeaways

  • International law‑enforcement cooperation proved essential in dismantling a globally distributed cyber‑crime infrastructure.
  • SocksEscort generated over $5 million in illicit revenue, primarily through cryptocurrency payments, indicating the growing convergence of cyber‑crime services and digital assets.
  • Technical intelligence from the private sector (Black Lotus Labs, Shadowserver) played a crucial role in identifying the malware and mapping the network.
  • Crypto‑related fraud remains a primary target for proxy services, reinforcing the importance of robust security practices for wallet holders and exchanges.
  • Future investigations may focus on the upstream supply chain of compromised IoT devices, aiming to prevent their conversion into malicious proxies.

The coordinated effort signals a heightened willingness among authorities to target the underlying tools that facilitate crypto theft, rather than only pursuing the end‑point perpetrators. As law‑enforcement tactics evolve, the crypto industry will need to stay vigilant, adopting stronger security hygiene and monitoring for emerging proxy‑related threats.



Source: https://cointelegraph.com/news/doj-europol-dismantle-socks-escort-proxy-network?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

spot_img

More from this stream

Recomended