We stay at the top of the updates of our phones and laptops. Some of us even make sure that our smartwatchs and security cameras have the most recent firmware. But routers often overlook. If it works, suppose it is fine, but this mentality can be risky.
The FBI has now issued a warning that cybercrimers are actively exploiting the old, not tied and obsolete routes. The alert, published in May 2025, explains how the aging network devices with known defects are abducted by malicious software and are used to feed the anonymous cybercrrimine operations. A forgotten device in your home can turn into a tool for attackers.
UNIV: Get my expert technology tips, critical security alerts and exclusive offers, as well as instantaneous access to my Free Survival Survival Free “ When you register!
A router (Kurt “Cyberguy” Knutsson)
The FBI alert
The FBI Internet Crime Complaints Center published a Public service announcement May 7, 2025warning both people and organizations that criminals are taking advantage of obsolete routers that no longer receive safety patches.
The devices made around 2010 or earlier are especially vulnerable, as sellers have stopped providing firmware updates. According to the FBI, these end -of -life routers have been breached by cyber actors by means of a variant of malicious software “fear”, allowing attackers to install Proxy services on devices and carry out illicit activities anonymously.
In essence, the routes of the household and the small offices are being picked up quietly in proxy networks that mask the identities of the online authors. The alert states that through networks such as “5Socks” and “Yearxy”, criminals have sold access to infected routers as proxy nodes. In these schemes, customers who pay can direct the traffic on the Internet through the routes of victims who do not want, darkening their own location while the victim’s device (and IP address) is blame.

A router (Kurt “Cyberguy” Knutsson)
The FBI warns about the new extortion scam aimed at sensitive data
Which routers are affected?
The FBI newsletter even names specific models in router as frequent goals, including:
- Cisco M10
- Cisco Linksys E1500
- Cisco Linksys E1550
- Cisco Linksys WRT610n
- Cisco Linksys E1000
- Cradlepoint E100
- Cradlepoint E300
- Linksys E1200
- Linksys E2500
- Linksys E3200
- Linksys WRT320n
- Linksys E4200
- Linksys WRT310N
All of these devices have about a decade or more and have known the security vulnerabilities that were never hooked after the support. With the firmware updates described, anyone still in use are soft targets for attackers.
What exactly is a breach of data? Why should I care?
How do these pirates exploit
Many recent infections come from Remote Administration devices exposed to the Internet. Attackants scan these routers, exploiting known firmware flaws without passwords. A single web request prepared can deceive an older device to run malicious code. Once inside, malicious software often alters configuration, opening ports or deactivating safety functions, to maintain control and connect to external control servers and control.
A prominent threat is Temoon, a malicious software strain that was first seen in 2014 that exploded the defects in Linksys’ routers. Since then it has evolved into a furtive botnet builder, transforming the leaders infected into proxy nodes. Instead of launching direct attacks, Themoon returns the traffic of third parties, masking the identities of the pirates behind the everyday homemade networks. Cybercrime platforms such as Faceless and 5Socks sell access to these routes infected as “residential representatives”, turning them into valuable assets on the digital metro.
For users, a committed router means slower connections, phishing and spyware exposure and possible legal problems if criminals abuse their IP address. For companies, the risk is even higher: obsolete routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In the critical sectors, the consequences can be serious, affecting security and compliance.
How to delete personal information from people’s search sites

A woman who works on her laptop (Kurt “Cyberguy” Knutsson)
200 million social media records were leaked to breach X Major X
6 ways to keep -safe pirates of computer science
Given the serious threats that the obsolete and committed routers represent, it is imperative to take proactive measures. Here are six practical steps that you can follow to protect your network and keep your hackers at bay.
1) Replace your old router if it is no longer compatible: If your router is over five to seven years old or if you do not find any recent update on the manufacturer’s website, it may be time to update. Older routers often stop solving security, which makes them an easy goal for hackers. To check, look at your router label the model number, and then search online “[model number] Update of firmware. “If the last update was years ago, consider it to replace it with a more recent model of a trust brand.
If you are not sure which router will be needed, see my list of The most important routers for the best safety. Includes models with strong safety functions and compatibility with VPN services.
2) Keep updated the firmware of your router: Your router runs software called firmware, which must be updated as your phone or computer. To do it, open a web browser and write the router IP address (often 192.168.0.1 or 192.168.1.1), and then log in using the username and password (usually found in a router sticker). Once inside, look for a section called “Firmware update”, “System” or “Administration” and check for an update available. Apply it if any. Some more recent routes also have applications that facilitate this.
3) Turn off remote access: Remote access allows you to control your trainer from outside your domestic network, but also opens the door to hackers. You can disable it by starting the settings of your router (using the same steps as above), and then find a configuration called “remote management”, “remote access” or “WAN access”. Make sure this feature is deactivated and then save the changes and restart the router.
4) Use a strong password for router settings: Do not leave the router through default login, such as “administrator” and “password”. This is the first thing that the hackers try. Change —the to a long and strong password with a combination of letters, numbers and symbols. A good example would be like t#8r2k! SG91XM4VL. Try to avoid using the same password you use elsewhere. You can usually change your login password in the “Administration” or “Security” section of the Router settings. Consider using a password manager to generate and store complex passwords. Get more details about my The best password managers reviewed by 2025 experts here.
5) Look at strange behavior and act quickly: If your Internet feels unusually slow, devices disconnect randomly or transmission buffers more than usual, it can mean that something goes wrong. Go to the Router settings and check the list of connected devices. If you see something you do not recognize, it could be a sign of breach. In this case, update the firmware, change the passwords and restart the router. If you don’t feel comfortable doing it yourself, call your Internet provider to get help.
6) Reports to the authorities: The FBI calls for victims or those who suspect a commitment report affect the Crime allegations center on the Internetwhich can help authorities to track and mitigate wider threats.
SUBSCRIVATE -DOES THE KURT Youtube channel to get quick video tips on how to work all your technological devices
Kurt’s Key Takeaway
It’s not just about asking everyone to update their old equipment. This is the biggest problem of who is really responsible when obsolete devices become safety risks. Most people do not think twice about the router sitting in a corner, quietly doing their last years. But the attackers do. They see the forgotten hardware as easy goals. The real challenge is not only technical. This is how manufacturers, service providers and users manage all the long queue of aging technology that still lives in the real world.
Should manufacturers be responsible for maintaining safe routers against cyber threats? Do -us to know by writing -us to Cyberguy.com/contact.
For more information on my technology tips and security alerts, subscribe -Free Cyberguy Report Bulletin Cyberguy.com/newsletter.
Ask a question to Kurt or to know what stories you would like to cover.
Follow Kurt on its social channels:
Answers to Cyberguy questions More tasks:
New of Kurt:
Copyright 2025 cyberguy.com. All rights reserved.
#FBI #warns #hackers #exploiting #obsolete #routers #Check
Image Source : www.foxnews.com