Malware & RansomwareHIGH

Authorities Disrupt SocksEscort Proxy Service Linked to AVrecon Botnet

SASecurity Affairs
AVreconSocksEscortEuropolbotnetcybercrime
🎯

Basically, police shut down a service that let criminals hide online by using hacked devices.

Quick Summary

Authorities have disrupted the SocksEscort proxy service tied to the AVrecon botnet. This operation affected around 360,000 devices globally. Criminals used these compromised devices for various illegal activities, leading to significant financial losses for victims.

How It Works

The SocksEscort proxy service operated by leveraging the AVrecon botnet?, which infected around 360,000 devices since its inception in 2020. This malicious service allowed cybercriminals to route their internet traffic through compromised devices, effectively hiding their identities while engaging in illegal activities. The operation was a significant threat, as it provided anonymity for various cybercrimes, including ransomware attacks and DDoS attacks.

On March 11, 2026, a coordinated effort by law enforcement agencies from the US and Europe, dubbed Operation Lightning, successfully disrupted the SocksEscort? service. Authorities seized 34 domains and 23 servers across seven countries, freezing approximately $3.5 million in cryptocurrency?. This operation showcased the power of international collaboration in combating cybercrime.

Who's Being Targeted

The victims of this proxy service were primarily home and small business internet routers. Many of these devices were hijacked due to vulnerabilities? in their firmware?, allowing the SocksEscort? service to exploit them without the owners' knowledge. The DoJ reported that these compromised devices were used to facilitate various fraud?ulent activities, including bank and cryptocurrency? account takeovers.

The impact was widespread, with more than 369,000 routers infected across 163 countries. This global reach meant that criminals could conduct operations targeting individuals and businesses alike, significantly increasing the risk of financial loss for many. Victims included a crypto investor who lost $1 million and a manufacturing firm that lost $700,000.

Signs of Infection

Detecting whether your device has been compromised can be challenging. Signs may include unexpected slowdowns in internet speed, unusual traffic patterns, or unfamiliar devices connected to your network. Users often remain unaware that their devices are being exploited for illicit activities, making it crucial to stay vigilant.

To mitigate risks, it's essential to regularly check for firmware? updates and apply them promptly. This practice can help close vulnerabilities? that cybercriminals exploit. Additionally, employing strong passwords and network security measures can further protect against unauthorized access.

How to Protect Yourself

To safeguard your devices and personal information, take proactive steps. Start by ensuring your router and other internet-connected devices are updated with the latest firmware?. This can significantly reduce the chances of being targeted by malware? like AVrecon?.

Consider using a reputable security solution that can monitor your network for unusual activity. Regularly changing your passwords and using unique ones for different accounts can also enhance your security. Finally, educate yourself about the latest cyber threats and stay informed about best practices to keep your digital life secure. By taking these measures, you can help protect yourself from falling victim to similar cybercrime schemes in the future.

💡 Tap dotted terms for explanations

🔒 Pro insight: The dismantling of SocksEscort highlights the critical need for robust firmware updates to mitigate botnet vulnerabilities.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

HIGHMalware & Ransomware

SmartApeSG Campaign Deploys Remcos RAT via ClickFix Page

A new campaign is using a fake ClickFix page to spread Remcos RAT. Individuals and organizations are at risk of remote access and data theft. Stay vigilant and protect your systems from this growing threat.

SANS ISC Full Text·
HIGHMalware & Ransomware

Ransomware Negotiator Allegedly Extorted Victims for Millions

A ransomware negotiator is accused of extorting victims for millions. DigitalMint claims ignorance of his actions. This scandal raises serious concerns about trust in cybersecurity professionals.

SC Media·
HIGHMalware & Ransomware

New VENON Malware Targets Brazilian Banking Users

A new malware called VENON is targeting Brazilian banking users. This Rust-based threat employs advanced techniques to steal sensitive information. Stay alert and protect your accounts from this evolving danger.

SC Media·
HIGHMalware & Ransomware

FBI Investigates Malware Spread Through Steam Games

The FBI is investigating malware hidden in Steam games. Gamers who installed these titles may have had their accounts compromised. If you played these games, report your experience to help the investigation.

BleepingComputer·
HIGHMalware & Ransomware

Credential Theft: Storm-2561 Spoofs VPN Clients to Steal Logins

A new cybercrime group is spoofing VPN clients to steal user credentials. Cisco and Fortinet users are particularly at risk. Stay alert and ensure you’re downloading software from official sources to protect your data.

The Register Security·
HIGHMalware & Ransomware

Ransomware Responder Allegedly Aided BlackCat Cybercriminals

A cybersecurity responder allegedly aided BlackCat hackers in negotiating higher ransoms. This shocking breach of trust has raised alarms in the industry. DigitalMint has since terminated the involved parties and is enhancing oversight.

The Record·