Sunday, May 18, 2025
HomeCyber Security NewsFBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

Published on

SIEM as a Service

Follow Us on Google News

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home users: cybercriminals are actively exploiting outdated, unsupported routers to hide their tracks and launch attacks, making them a favored tool for masking malicious operations.

According to a new security advisory released May 7, FBI investigators have observed a troubling spike in cyberattacks utilizing “end-of-life” (EOL) routers.

These devices, no longer supported with updates or security patches by their manufacturers, have become prime targets for hackers seeking to install malware and incorporate them into botnets.

- Advertisement - Google News

Outdated Routers, Active Threats

The advisory highlights that criminal services such as 5Socks and Anyproxy are leveraging EOL routers by exploiting well-known vulnerabilities.

Once compromised, these routers can be remotely controlled and used as part of a proxy network, allowing bad actors to conceal their true identities and physical locations when conducting attacks worldwide, including targeting U.S. critical infrastructure.

A partial list of affected models includes popular household and small business routers such as the Linksys E1200, E2500, WRT320N, and E4200, among others.

“Once the attacker gains access, they install persistent malware, making the routers part of a global botnet,” the FBI noted.

“These are then rented out to other criminals as proxy devices, further obfuscating illegal activities from law enforcement scrutiny.”

Infiltration Techniques and Difficult Detection

Attackers gain entry by taking advantage of remote management features, often left enabled and sometimes inadequately secured.

Even password protection can be bypassed due to inherent flaws in the outdated software. After infiltrating, the malware communicates regularly with external command-and-control servers, ensuring the device remains under hacker control.

Detecting such infections is difficult for average users, as most commercially available antivirus software cannot scan routers for embedded threats.

The FBI provided technical details, including specific files and hashes linked to the current wave of attacks, but stressed that even experts may find detection and remediation challenging on unsupported devices.

The FBI is urging individuals and organizations to inventory their network equipment for EOL routers and replace them with newer models that receive regular security updates.

For those unable to immediately upgrade, disabling remote administration features and regularly rebooting the device can mitigate risk, though these are stopgap measures.

In addition, the FBI encourages anyone noticing unusual network activity or possible signs of compromise to report details to their local FBI Cyber Squad.

Rapid reporting, officials say, is vital for protecting the broader community and enabling timely disruption of criminal operations.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...