The FBI warns the computer pirates who exploit obsolete routers. Look yours now

The FBI warns the computer pirates who exploit obsolete routers. Look yours now

We stay aware of the updates for our portable phones and computers. Some of us even ensure that our smart watches and security cameras are running the last firmware. But routers are often overlooked. If it is working, we assume that it is fine, but that mentality can be risky.

Now, the FBI has issued a warning that cybercriminals are actively exploiting ancient routines, without patches and outdated. The alert, launched in May 2025, explains how the aged network devices with known defects are being kidnapped by malware and are used to feed anonymous operations of cyber crimes. A forgotten device in your home can become a silence in silence for attackers.

Usa to the “Cyberguy Free Report: Obtain my expert technology advice, critical security alerts and exclusive offers, in addition to instant access to my Survival guide for the free final scam “ When you register!

The FBI warns the computer pirates who exploit obsolete routers. Look yours now

A router (Kurt “Cyberguy” Knutsson)

The FBI alert

The FBI Internet Crimes Complaints Center published a Public service announcement on May 7, 2025warning both people and organizations that criminals are taking advantage of obsolete routers that no longer receive security patches.

The devices manufactured around 2010 or before are especially vulnerable, since suppliers have stopped providing firmware updates for them. According to the FBI, cyber actors have violated such end of life routers using a “Themon” malware variant, which allows attackers to install proxy services on the devices and carry out illegal activities anonymously.

In essence, the routers at home and the small office are silently recruiting in proxy networks that mask the identities of the perpetrators online. The alert points out that through networks such as “5Socks” and “Anyproxy”, criminals have been selling access to infected rings as proxy nodes. In these schemes, payment customers can enrut their Internet traffic through the routers of involuntary victims, obscuring their own location while the victim’s device (and the IP address) are to blame.

The FBI warns the computer pirates who exploit obsolete routers. Look yours now

A router (Kurt “Cyberguy” Knutsson)

FBI warns about the new extortion scam aimed at confidential data

What routers are affected?

The FBI bulletin even names models of specific routers as frequent objectives, which include:

  • Cisco M10
  • Cisco Linksys E1500
  • Cisco Linksys E1550
  • Cisco Linksys WRT610n
  • Cisco Linksys E1000
  • CRADLEPOINT E100
  • Cradlepoint E300
  • E1200 Linksys
  • E2500 Linksys
  • Linksys E3200
  • WRT320N links
  • E4200 Linksys
  • WRT310N Linksys

All these devices are approximately a decade or older and have known security vulnerabilities that were never patched once the support ended. With its firmware updates for a long time, any use that is still in use are soft objectives for the attackers.

What exactly is a data violation? Why should I care?

How hackers explode these routers

Many recent infections come from devices with remote administration exposed to the Internet. The attackers scan such routers, exploiting known firmware failures without passwords. A single designed web application can deceive an older device to run malicious code. Once inside, the malware often alters the configuration, the opening of ports or disabling the security characteristics, to maintain control and connect to external command and control servers.

A prominent threat is Themonon, a malware tension seen for the first time in 2014 that exploded failures in the rings linksys. Since then, it has become a stealthy Botnet builder, transforming infected rings into proxy nodes. Instead of launching direct attacks, Themoon redirects third -party traffic, masking the identities of computer pirates behind everyday domestic networks. Cyber ​​crime platforms such as Face and 5Socks sell access to these infected routers such as “residential proxies”, which makes them valuable assets in the digital metro.

For users, a compromised router means slower connections, exposure to phishing and spyware, and possible legal problems if criminals abuse their IP address. For companies, risk is even greater: obsolete routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In the critical sectors, the consequences can be serious, affecting security and compliance.

How to delete your personal information from people search sites

The FBI warns the computer pirates who exploit obsolete routers. Look yours now

A woman who works on her laptop (Kurt “Cyberguy” Knutsson)

200 million social media records filtered in data violation x Major X

6 ways to stay safe from routing hackers

Given the serious threats raised by obsolete and committed routers, it is essential to take proactive measures. Here are six practical steps that can continue to protect your network and keep the computer pirates at bay.

1) Replace its old router if it is no longer compatible: If your router is over five to seven years, or if you cannot find any recent update for it on the manufacturer’s website, it could be the time to update. The oldest routers often stop obtaining security solutions, which makes them an easy objective for computer pirates. To verify, look at the label on your router for the model number, then look online “[model number] Firmware update. “If the last update was years ago, consider replacing it with a newer model of a reliable brand.

If you are not sure to get on, see my list of The best routers for the best security. Includes models with strong security and compatibility characteristics with VPN services.

2) Keep your router firmware updated: Its router runs software called firmware, which must be updated as well as your phone or computer. To do this, open a web browser and write the IP address of its router (often 192.168.0.1 or 192.168.1.1), then log in using the username and password (it is usually on a label in the router). Once inside, look for a section called “Firmware update”, “system” or “administration” and verify if there is an available update. Apply it if there is one. Some newer routers also have applications that make this even easier.

3) Turn off remote access: Remote access allows you to control your router from outside your domestic network, but also opens the door to computer pirates. You can turn off this starting session in the configuration of your router (using the same steps as previously), then finding a configuration called “remote management”, “remote access” or “wan access”. Make sure this function is disabled, then save the changes and restart your router.

4) Use a safe password for your router configuration: Do not leave your router using the predetermined login, such as “admin” and “password.” That is the first thing the hackers try. Change it to a long and safe password with a combination of letters, numbers and symbols. A good example would be something like t#8r2k! SG91XM4VL. Try to use the same password you use elsewhere. In general, you can change the login password in the “administration” or “safety” section of the router configuration. Consider using a password administrator to generate and store complex passwords. Get more details about me The best password administrators reviewed by experts of 2025 here.

5) Be aware of strange behavior and act quickly: If your internet feels unusually slow, its devices are randomly disconnected or its transmission buffers more than usual, it could mean that something is wrong. Go to the configuration of your router and see the list of connected devices. If you see something that you do not recognize, it could be a sign of a violation. In that case, update the firmware, change your passwords and restart the router. If you do not feel comfortable doing this yourself, call your Internet provider to get help.

6) Report to the authorities: The FBI asks that the victims or those who suspect a commitment report incidents to the Internet crime complaints centerwhich can help authorities track and mitigate broader threats.

Subscribe to Kurt’s YouTube channel to obtain fast video tips on how to work all its technological devices

Kurt key takeway

It’s not just asking everyone to update their former team. This is the biggest problem of who is really responsible when obsolete devices become safety risks. Most people do not think twice about the router sitting in a corner, silently doing their work years after their best moment. But the attackers do it. Come forgotten hardware as easy goals. The real challenge is not just a technician. This is how manufacturers, service providers and users handle the long tail of aging technology that still lives in the real world.

Should manufacturers be responsible for keeping safe routers against cyber threats? Get us knowing in Cyberguy.com/contact.

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.

Ask Kurt a question or let us know what stories we would like to cover.

Follow Kurt in his social channels:

  • Facebook
  • YouTube
  • Instagram

Answers to the most informed Cyberguys questions:

  • What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
  • What is the best way to stay private, safe and anonymous while navigating the web?
  • How can I get rid of robocalls with data elimination applications and services?
  • How do I eliminate my private internet data?

New Kurt:

  • Try the new Cyberguy games (crosswords, words searches, trivia and more!)
  • Cyberguy exclusive coupons and offers

Copyright 2025 Cyberguy.com. All rights reserved.

Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of ​​the story or comment on Cyberguy.com.

Leave a Reply

Your email address will not be published. Required fields are marked *