Outdated Home Routers Could Allow Hackers to Steal Your Personal Information

FBI jacket with yellow lettering

Your home router may be secretly aiding cybercriminals in their attacks while giving them a backdoor into your private network, the FBI warns in an alarming new security alert.

Key Takeaways

  • The FBI has issued an urgent warning about hackers exploiting outdated routers through “TheMoon” malware, enabling anonymous criminal operations
  • Routers manufactured before 2010 or those no longer receiving firmware updates are particularly vulnerable to these sophisticated attacks
  • Compromised networks can be hijacked to launch attacks against others, mask criminal activity, and potentially expose your personal data
  • Immediate protective measures include replacing old routers, disabling remote administration features, and ensuring regular firmware updates

FBI Sounds Alarm on Outdated Router Vulnerability

The FBI’s Internet Crime Complaint Center (IC3) released an urgent cybersecurity warning on May 7, 2025, alerting Americans that outdated home and office routers have become prime targets for foreign-based threat actors. Security experts have identified a troubling trend where cybercriminals are specifically targeting routers that are past their end-of-life support period, meaning they no longer receive critical security updates from manufacturers. These devices present an easy entry point for hackers seeking to establish footholds in personal and business networks across the country.

“Even if your router ‘works,’ it could be silently helping bad actors attack others online—or worse, giving them a foothold into your network,” the FBI warns in their alert.

The problem is particularly concerning because many users maintain a false sense of security when their internet appears to function normally. According to the FBI, specific vulnerable router brands include popular models from Netgear, Linksys, TP-Link, D-Link, Belkin, Asus, Cisco, SonicWall, WatchGuard, and MikroTik. Any router manufactured in 2010 or earlier is likely susceptible to these attacks, though even some newer models may be at risk if they’re no longer supported by their manufacturers.

TheMoon Malware: The Silent Network Hijacker

The primary threat identified in the FBI’s warning is a sophisticated malware variant called “TheMoon.” This malicious software exploits vulnerabilities in outdated routers without requiring passwords, scanning for open ports and sending commands to vulnerable scripts. Once infected, these compromised devices can be weaponized to form botnets, launch distributed denial-of-service (DDoS) attacks, and provide criminals with anonymous proxies to hide their illicit activities.

“TheMoon reroutes third-party traffic, masking hackers’ identities behind everyday home networks,” the FBI explains in their cybersecurity bulletin.

What makes this threat particularly insidious is that many infections occur because users leave remote administration features enabled on their routers, exposing them to the internet. This default setting on many routers creates an easily exploitable pathway for attackers. Once compromised, these routers become valuable commodities in underground cybercrime markets, where access to “residential proxies” is sold to other criminals seeking to mask their digital footprints.

The Expanding Threat Landscape for Critical Infrastructure

The implications of this security threat extend beyond individual homes to critical infrastructure, including healthcare facilities. With the rise of remote work, compromised home networks can potentially serve as entry points to hospital systems and other sensitive networks. Security experts emphasize that this represents an expanding attack surface that many organizations have yet to adequately address in their cybersecurity protocols.

“This is a good example of the expanding attack surface and additional threats introduced by third-party technology,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “Home routers need to be maintained just like other devices, but they are often overlooked. Hospital IT teams need to pay particular attention to remote workers connecting to their networks from home. This is also a good opportunity to remind remote staff to make sure their home equipment is up to date and patched as they connect to hospital networks.”

The underground economy surrounding these compromised devices has grown sophisticated, with cybercrime platforms developing around the exploitation of vulnerable routers. According to the FBI, “Cybercrime platforms like Faceless and 5socks sell access to these infected routers as ‘residential proxies,’ making them valuable assets in the digital underground.” This marketplace approach highlights how organized and profitable these exploitation networks have become.

Protecting Your Network from Modern Threats

To safeguard against these evolving threats, the FBI recommends several immediate protective measures. First and foremost, users should replace any router manufactured before 2010 or any device that is no longer receiving firmware updates from its manufacturer. For newer routers, ensure that automatic updates are enabled and that remote administration features are disabled unless absolutely necessary. Changing default login credentials and implementing strong, unique passwords for router access are also essential steps.

For businesses and organizations requiring more robust protection, cybersecurity experts recommend upgrading to modern firewalls with advanced threat protection capabilities. Features such as intrusion prevention, DNS filtering, geo-blocking, deep packet inspection, and AI-powered threat detection provide multiple layers of defense against sophisticated attacks. As President Trump’s administration continues to emphasize the importance of cybersecurity for national defense, these recommendations align with broader efforts to strengthen America’s digital infrastructure against foreign threats.

The FBI’s warning serves as a stark reminder that in today’s interconnected world, even seemingly innocuous devices like home routers can become weaponized in the hands of determined cybercriminals. Taking proactive steps to secure these devices is no longer optional—it’s an essential component of protecting both personal data and our national cybersecurity posture.