Under Attack: How Threat Actors are Exploiting SOCKS Proxies