Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

We stay on top of updates for our phones and laptops. Some of us even ensure that our smart watches and security cameras are performing the latest firmver. But routers often neglect. If it works, we assume it’s okay, but that mindset can be risky.
Now the FBI has issued a warning that Cyber -criminals are actively exploiting old, undiscovered and outdated routers. The warning, published in May 2025, explains that network devices with known flaws make it difficult for malicious software and are used to power the anonymous operations of Cyber -criminal. The forgotten device in your home can quietly become a tool for attackers.

The router (Kurt “Cyberguy” Knutsson)
FBI -O’s Criminal Appeal Center on the Internet posted Public Service announcement 7 May 2025Warning both individuals and organizations that criminals use outdated routers who no longer receive security patches.
Devices produced around 2010 or earlier are especially vulnerable, as suppliers have long stopped providing firmware updates for them. According to the FBI, such routers at the end of their lives have broken Cyber-Actors using the “Themoon” malicious software variant, allowing attackers to install proxy services on devices and anonymously carry out illegal activities.
Basically, home and small neat routers are quietly recruited into the proxy networks that mask the identities of the perpetrator online. The warning notes that through networks such as “5Socks” and “Anyproxy” criminals sold access to infected routers as proxy knots. In these schemes, the payment of customers can direct their internet traffic through the routers of unconscious casualties, darkening their own position, while the victim’s (and IP address) of the blood is to blame.

The router (Kurt “Cyberguy” Knutsson)
FBI warns about new frauds that target sensitive data
FBI Bulletin even calls specific router models as frequent goals including:
All of these devices are about a decade or more older and know security vulnerability that have never been patched after support has ended. Given that their firmver has long been abolished, any still in use are soft goals for attackers.
What exactly is the data violation? Why should I worry?
Many recent infections derive from a device with a remote administration exposed to the Internet. The attackers scan such routers, exploiting the famous firmware shortcomings without the need for password. One designed web request may indicate an older device in launching a malicious code. Once inside, malicious software often changes settings, opening connections or disabling safety features to maintain control and connect with external command and control servers.
One prominent threat is Theoon, a stray software strain first seen in 2014, which exploited defects in Linksys routers. Since then, it has developed into a covert Botnette builder, turning the infected routers into proxy knots. Instead of launching direct attacks, Themoon diverts third -party traffic, masking the identities of the hackers behind everyday home networks. Cyber -criminal platforms like faceless and 5SOCKS sell access to these infected routers as “housing proxy”, making them a valuable property in the digital underground.
For users, a compromised router means slower connections, exposure to identity theft and spy software and potential legal problems if criminals abuse their IP address. For companies, the risk is even higher: outdated routers can be used for deeper into the network, the theft of data and attacks of Ransomware. In critical sectors, the consequences can be serious, which affects safety and compliance.
How to Remove your Personal Data from People’s Search Website

A woman working on her laptop (Kurt “Cyberguy” Knutsson)
200 million records on social media leaked in a great breach of data x
Given the serious threats represented by obsolete and compromised routers, taking proactive measures is necessary. Here are six practical steps you can follow to protect your network and keep hackers in stock.
1) Replace your old router if it is no longer supported: If your router is more than five to seven years old or if you cannot find recent updates for it on the manufacturer’s website, it may be time to upgrade. Older routers often stop getting safety repairs, making them a simple target for hackers. To check, look at the sticker on the router for the number of models, then look for online “[model number] Firmware update. “If the last update was years ago, consider replacing it with a recent model than a reliable brand.
If you are not sure which router get, see my list Top router for best security. Includes models with strong security features and compatibility with VPN services.
2) Notify the router firmver: Your router runs a software called Firmware, which must be updated just like your phone or computer. To do this, open the web browser and enter the IP address of your router (often 192.168.0.1 or 192.168.1.1) and then sign in using the user name and password (usually located on the router sticker). Once inside, look for a section called “Update Firmware”, “System” or “Administration”, and make sure the update is available. Apply it if there is. Some newer routers also have applications that make it easier.
3) Turn off the remote approach: The remote approach allows you to control the router outside the home network, but also opens the door to the hackers. You can exclude this by logging into the router settings (using the same steps as above) and then find a setting called “remote control”, “remote approach” or “WAN approach”. Make sure this feature is disabled and then save changes and restart the router.
4) Use a powerful password for the router settings: Do not leave the router using a default application, such as “Administrator” and “Passwords”. This is the first thing the hackers try. Change it to a long, strong password with a mixture of letters, numbers and symbols. A good example would be something like T#8R2K! SG91xm4vl. Try to avoid using the same password you use elsewhere. You can usually change your login password in the “Administration” section or “security” of the router settings. Consider using password manager to generate and store complex passwords. Get more details about my Best reviewed password managers from 2025. Here.
5) Watch out for strange behavior and act quickly: If your Internet feels unusually slow, your devices randomly exclude the relationship or your streaming clips more than usual, it might mean something is wrong. Enter the router settings and check the list of connected devices. If you see something you don’t recognize, it could be a sign of violation. In that case, update the firmver, change your passwords and restart the router. If you are not comfortable to do this, call your internet provider to help.
6) Authority Reporting: The FBI is asking for victims or those who suspect compromise reports of incidents Internet Crime Center Centerwhich can help the authorities accompany and alleviate the wider threats.
Subscribe to Kurt’s YouTube channel for fast video tips on how to do all your technological devices
It’s not just about to ask everyone to upgrade their old equipment. It is a bigger question who is actually responsible when outdated devices turn into security risks. Most people do not think twice about the router sitting in a corner, quietly doing their job before their prime minister. But the attackers do it. Forgotten hardware is seen as simple goals. The real challenge is not just technically. This is how manufacturers, service providers and users all carry a long tail of aging technology that still lives in the real world.
Should manufacturers be responsible for keeping a router safe from cyber threats? Let us know by writing us on Cyberguy.com/contact.
For more of my technological tips and security warnings, subscribe to my free newsletter about Cyberguy Report, moving toward Cyberguy.com/newslettter.
Ask the Kurt question or let us know which stories would you like to cover.
Follow Kurt on his social channels:
Answer to the most demanding questions about Cyberguy:
New from Kurt:
Copyright 2025 Cyberguy.com. All rights reserved.