US and European authorities disrupt socksEscort proxy service tied to AVrecon botnet
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得快速浏览一下文章,抓住主要信息。 文章讲的是美国和欧洲的执法机构破坏了一个名为SocksEscort的代理服务,这个服务利用了AVrecon僵尸网络。自2020年以来,该服务已经感染了大约36万设备。他们通过Operation Lightning行动,在多个国家采取措施,包括查封域名和服务器,冻结资金,并切断受感染设备的网络连接。 接下来,我需要把这些信息浓缩到100字以内。重点包括:执法机构、SocksEscort、AVrecon僵尸网络、感染设备数量、行动措施以及影响。 可能的结构是:执法机构如何行动,针对什么服务和僵尸网络,感染了多少设备,采取了哪些措施,以及后果。 现在开始组织语言:美国和欧洲执法机构破坏了SocksEscort代理服务,该服务利用AVrecon僵尸网络感染了约36万台设备。通过Operation Lightning行动,在多国查封了域名和服务器,并切断受感染设备的网络连接。 检查一下字数是否在限制内,并且是否涵盖了主要信息点。看起来没问题。 </think> 美国和欧洲执法机构破坏了SocksEscort代理服务,该服务利用AVrecon僵尸网络自2020年起感染约36万台设备。通过"Operation Lightning"行动,多国查封34个域名和23个服务器,切断受感染设备网络连接。 2026-3-13 15:7:50 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

US and European authorities disrupt socksEscort proxy service tied to AVrecon botnet

Authorities in the US and Europe disrupted the SocksEscort proxy service, which used the AVrecon botnet and infected about 360,000 devices since 2020.

Law enforcement agencies in the US and Europe have disrupted SocksEscort, a malicious proxy service powered by the AVrecon botnet. Active since 2020, the service hijacked roughly 360,000 devices and allowed cybercriminals to route traffic through compromised systems to support illegal activities.

On March 11, 2026, Europol and partners from the US and several European countries launched Operation Lightning against the SocksEscort. The service had compromised more than 369,000 routers and IoT devices across 163 countries, providing over 35,000 proxies to customers. Authorities seized 34 domains and 23 servers in seven countries and froze $3.5 million in cryptocurrency while disconnecting infected devices from the network.

An investigation led by Europol found a botnet of infected devices, mainly residential routers exploited through vulnerabilities. The network supported cybercrime activities such as ransomware operations, DDoS attacks, and the distribution of child sexual abuse material.

“The compromised devices were infected through a vulnerability in the residential modems of a specific brand. Customers of the criminal service paid for licences to abuse these infected devices, hiding their original IP addresses to engage in various criminal activities.” reads the press release published by Europol. “To protect against such exploits, users, and vendors are advised to update the firmware of their devices regularly.”

The SocksEscort platform sold access to compromised IP addresses from infected routers and modems worldwide, allowing criminals to hide their identity online. Victims were unaware their devices were abused for illicit activity. According to Europol, customers paid anonymously with cryptocurrency, generating over €5 million in revenue.

“Cybercrime thrives on anonymity. Proxy services like ‘SocksEscort’ provide criminals with the digital cover they need to launch attacks, distribute illegal content and evade detection. By dismantling this infrastructure, law enforcement has disrupted a service that enabled cybercrime on a global scale.” said Catherine De Bolle, the Europol Executive Director. “Operations like this show that when investigators connect the dots internationally, the infrastructure behind cybercrime can be exposed and shut down.”

The US DoJ confirmed also wrote that crooks used the SocksEscort network to hide their real IP addresses and locations while carrying out fraud, including bank and cryptocurrency account takeovers and fake unemployment claims in the U.S. Victims lost millions, including $1M from a crypto investor and $700K from a manufacturing firm. Authorities from Austria, France, and the Netherlands helped dismantle the infrastructure.

“According to court documents, SocksEscort infected home and small business internet routers with malware. The malware allowed SocksEscort to direct internet traffic through the infected routers. SocksEscort sold this access to its customers. Since the summer of 2020, SocksEscort has offered to sell access to about 369,000 different IP addresses.” states the DoJ. “As of February 2026, the SocksEscort application listed approximately 8,000 infected routers to which its customers could buy access, of those, 2,500 were in the United States.”

In July 2023, Lumen Black Lotus Labs uncovered a long-running hacking campaign targeting SOHO routers with a strain of malware dubbed AVrecon. The malware was spotted for the first time in May 2021, but has been operating under the radar for more than two years.

“Lumen Black Lotus Labs identified another multi-year campaign involving compromised routers across the globe. This is a complex operation that infects small-office/home-office (SOHO) routers, deploying a Linux-based Remote Access Trojan (RAT) we’ve dubbed “AVrecon.”” reads the analysis published by Lumen.

Threat actors behind the campaign aimed at building a botnet to use for a range of criminal activities, from password spraying to digital advertising fraud.

The AVrecon malware was written in C to ensure portability and designed to target ARM-embedded devices. The experts discovered that the malicious code had been compiled for different architectures.

Black Lotus Labs announced it had partnered with the Department of Justice in taking down the proxy network known.

“This botnet posed a significant threat, as it was marketed exclusively to criminals and composed solely of compromised edge devices. Over the past several years, SocksEscort maintained an average size of approximately 20,000 distinct victims weekly, with communications routed through an average of 15 command-and-control nodes (C2s).” Lumen experts wrote on LinkedIn.

More than half of the victims were located in the United States and the United Kingdom, allowing attackers to conduct highly targeted operations and increasing the risks associated with the SocksEscort proxy network.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, AVrecon botnet)




文章来源: https://securityaffairs.com/189391/security/us-and-european-authorities-disrupt-socksescort-proxy-service-tied-to-avrecon-botnet.html
如有侵权请联系:admin#unsafe.sh