Western Authorities Dismantle SocksEscort Malicious Proxy Network, Freeze 3.5 Million Dollars in Crypto Assets

Gate News Report, on March 13, the European Police Organization (Europol) and the U.S. Department of Justice announced the takedown of a malicious proxy service network called “SocksEscort” and the seizure of $3.5 million in cryptocurrency related to the case. The network infected over 369,000 routers and IoT devices across 163 countries, providing more than 35,000 proxies to users in recent years. During the operation, 34 domains and 23 servers across seven countries were seized, and the payment platforms associated with the service are estimated to have received over $5.7 million in cryptocurrency. The investigation began in June 2025 and found that the infected devices were mainly used to facilitate crimes such as ransomware and DDoS attacks. The U.S. Department of Justice charged that the criminals used the proxy service to hide their locations and carry out frauds including bank and crypto account takeovers, with victims losing over $1 million in a case involving a client of a New York-based crypto exchange.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Polish Crypto Exchange Zondacrypto CEO Flees to Israel as $97M Fraud Probe Deepens

Polish prosecutors have opened a fraud investigation into cryptocurrency exchange Zondacrypto after chief executive Przemysław Kral departed for Israel, where his citizenship could prevent extradition, leaving up to 30,000 users facing losses tied to an inaccessible cold wallet holding 4,500

Coinpedia1h ago

Litecoin Reorg Undoes MWEB Privacy Layer Exploit

Litecoin underwent a deep chain reorganization on Saturday after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according to the Litecoin Foundation. The incident resulted in a three-hour reorg that erased invalid transactions from the

CryptoFrontier1h ago

US Sanctions Iran-Linked Crypto Wallets Holding $344M Frozen by Tether

U.S. Treasury Secretary Scott Bessent announced sanctions on multiple wallets linked to Iran as part of President Donald Trump's efforts to increase economic pressure on the country, according to CNN. The move follows Tether's freeze of $344 million in USDT on Tron, which has been linked to

CryptoFrontier1h ago

CFTC sues New York State: Defend the federal exclusive jurisdiction over prediction markets

CFTC4/24 filed a lawsuit against the State of New York in the U.S. Federal Court for the Southern District of New York, arguing that the event contracts are subject to federal exclusive jurisdiction, and seeking a permanent injunction to stop state law from interfering with CFTC-registered entities. The core issue is field preemption; if they win, Polymarket, Kalshi, and others in the U.S. will have compliance and market positioning dominated by the federal framework, and the influence of state law will be weakened.

ChainNewsAbmedia4h ago

North Korean IT Workers Laptop Farm Scam: US Co-Conspirator Sentenced to 7–9 Years, Netting $2.8 Billion Over Two Years

Fortune reported that North Korea used laptop farms inside the United States, generating about $2.8 billion in revenue over two years to support nuclear weapons; annual tribute is $250–600 million. The U.S. citizen suspects Kejia Wang and Zhenxing Wang were each sentenced to 7.5 years and 9 years, respectively, for involvement exceeding 100 companies and 80 cases of identity theft. North Korea operated in the U.S. using U.S. identities and fixed devices, with funds mostly being converted via cryptocurrencies. Experts warn that an accomplice network still exists inside the country, and companies must strengthen identity verification, address tracking, and time zone/IP analysis.

ChainNewsAbmedia4h ago
Comment
0/400
No comments