On March 11, 2026, a coordinated international law enforcement action known as "Operation Lightning" successfully disrupted the SocksEscort residential proxy network. This criminal service provided an anonymization layer for cybercriminals by leveraging a massive botnet of compromised routers. The operation was a joint effort between the FBI, Europol, and agencies from Austria, France, and the Netherlands, with critical support from private sector partners including Lumen's Black Lotus Labs and The Shadowserver Foundation. SocksEscort's infrastructure, built on the AVRecon botnet malware, infected approximately 369,000 routers across 163 countries. The takedown involved seizing dozens of domains and servers and freezing millions in illicit cryptocurrency proceeds, significantly disrupting the ability of criminals to conduct anonymous, large-scale fraud.
SocksEscort was a 'proxy-as-a-service' offering that functioned as a critical piece of the cybercrime supply chain. It allowed malicious actors to route their internet traffic through legitimate, residential IP addresses, making their activities incredibly difficult to trace.
The SocksEscort network is a prime example of a botnet being monetized as a service.
T1190 - Exploit Public-Facing Application) or weak/default credentials (T1110.001 - Password Guessing).T1210 - Exploitation of Remote Services).T1090 - Proxy. The criminals using the service would connect to the SocksEscort platform, which would then route their traffic through one of the compromised routers.The impact of SocksEscort was twofold. First, the owners of the 369,000 infected routers were victims, their devices and internet connections co-opted for criminal purposes without their knowledge. Second, the service enabled a vast criminal ecosystem, contributing to tens of millions of dollars in direct financial losses for individuals and businesses worldwide. For example, one New York resident lost approximately $1 million in cryptocurrency in a scam facilitated by the SocksEscort network. The dismantling of this service removes a major anonymization tool from the hands of thousands of criminals, forcing them to find new, potentially less effective methods to hide their tracks.
The operation resulted in the seizure of 34 domains and 23 servers. A full list of IOCs may be released by the FBI or Europol at a later date.
Detecting a compromised router on a home or small business network can be difficult.
D3-NTA - Network Traffic Analysis is key here.Preventing router compromise is key to stopping these botnets from growing.
M1027 - Password Policies.M1051 - Update Software.M1035 - Limit Access to Resource Over Network.Keep router and IoT device firmware up-to-date to patch vulnerabilities exploited by botnets.
Mapped D3FEND Techniques:
Change default passwords on all network devices to strong, unique credentials.
Mapped D3FEND Techniques:
Disable remote administration access to routers from the internet to prevent external scanning and exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats