Technology
FBI warns of hackers exploiting outdated routers. Check yours now
We stay on top of updates for our phones and laptops. Some of us even make sure our smartwatches and security cameras are running the latest firmware. But routers often get overlooked. If it’s working, we assume it’s fine, but that mindset can be risky.
Now, the FBI has issued a warning that cybercriminals are actively exploiting old, unpatched and outdated routers. The alert, released in May 2025, explains how aging network devices with known flaws are being hijacked by malware and used to power anonymous cybercrime operations. A forgotten device in your home can silently become a tool for attackers.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
A router (Kurt “CyberGuy” Knutsson)
The FBI alert
The FBI’s Internet Crime Complaint Center published a public service announcement on May 7, 2025, cautioning both individuals and organizations that criminals are taking advantage of outdated routers that no longer receive security patches.
Devices manufactured around 2010 or earlier are especially vulnerable, as vendors have long ceased providing firmware updates for them. According to the FBI, such end-of-life routers have been breached by cyber actors using a variant of the “TheMoon” malware, allowing attackers to install proxy services on the devices and conduct illicit activities anonymously.
In essence, home and small-office routers are being quietly conscripted into proxy networks that mask the perpetrators’ identities online. The alert notes that through networks like “5socks” and “Anyproxy,” criminals have been selling access to the infected routers as proxy nodes. In these schemes, paying customers can route their internet traffic through unwitting victims’ routers, obscuring their own location while the victim’s device (and IP address) bears the blame.
A router (Kurt “CyberGuy” Knutsson)
FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA
Which routers are affected?
The FBI bulletin even names specific router models as frequent targets, including:
- Cisco M10
- Cisco Linksys E1500
- Cisco Linksys E1550
- Cisco Linksys WRT610N
- Cisco Linksys E1000
- Cradlepoint E100
- Cradlepoint E300
- Linksys E1200
- Linksys E2500
- Linksys E3200
- Linksys WRT320N
- Linksys E4200
- Linksys WRT310N
All of these devices are roughly a decade or more old and have known security vulnerabilities that were never patched once support ended. With their firmware updates long discontinued, any still in use are soft targets for attackers.
WHAT EXACTLY IS A DATA BREACH? WHY SHOULD I CARE?
How hackers exploit these routers
Many recent infections stem from devices with remote administration exposed to the internet. Attackers scan for such routers, exploiting known firmware flaws without needing passwords. A single crafted web request can trick an older device into running malicious code. Once inside, malware often alters settings, opening ports or disabling security features, to maintain control and connect to external command-and-control servers.
One prominent threat is TheMoon, a malware strain first seen in 2014 that exploited flaws in Linksys routers. It has since evolved into a stealthy botnet builder, transforming infected routers into proxy nodes. Instead of launching direct attacks, TheMoon reroutes third-party traffic, masking hackers’ identities behind everyday home networks. Cybercrime platforms like Faceless and 5socks sell access to these infected routers as “residential proxies,” making them valuable assets in the digital underground.
For users, a compromised router means slower connections, exposure to phishing and spyware, and potential legal trouble if criminals abuse their IP address. For businesses, the risk is even higher: Outdated routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In critical sectors, the consequences can be severe, affecting safety and compliance.
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES
A woman working on her laptop (Kurt “CyberGuy” Knutsson)
200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH
6 ways to stay safe from router hackers
Given the serious threats posed by outdated and compromised routers, taking proactive measures is essential. Here are six practical steps you can follow to protect your network and keep hackers at bay.
1) Replace your old router if it’s no longer supported: If your router is more than five to seven years old, or if you can’t find any recent updates for it on the manufacturer’s website, it might be time to upgrade. Older routers often stop getting security fixes, which makes them an easy target for hackers. To check, look at the label on your router for the model number, then search online for “[model number] firmware update.” If the last update was years ago, consider replacing it with a newer model from a trusted brand.
If you’re not sure which router to get, check out my list of top routers for the best security. It includes models with strong security features and compatibility with VPN services.
2) Keep your router’s firmware updated: Your router runs software called firmware, which needs to be updated just like your phone or computer. To do this, open a web browser and type your router’s IP address (often 192.168.0.1 or 192.168.1.1), then log in using the username and password (usually found on a sticker on the router). Once inside, look for a section called “Firmware Update,” “System” or “Administration,” and check if an update is available. Apply it if there is one. Some newer routers also have apps that make this even easier.
3) Turn off remote access: Remote access lets you control your router from outside your home network, but it also opens the door for hackers. You can turn this off by logging into your router’s settings (using the same steps as above), then finding a setting called “Remote Management,” “Remote Access” or “WAN Access.” Make sure this feature is disabled, then save the changes and restart your router.
4) Use a strong password for your router settings: Don’t leave your router using the default login, like “admin” and “password.” That’s the first thing hackers try. Change it to a long, strong password with a mix of letters, numbers and symbols. A good example would be something like T#8r2k!sG91xm4vL. Try to avoid using the same password you use elsewhere. You can usually change the login password in the “Administration” or “Security” section of the router settings. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.
5) Look out for strange behavior and act quickly: If your internet feels unusually slow, your devices randomly disconnect or your streaming buffers more than usual, it could mean something is wrong. Go into your router settings and check the list of connected devices. If you see something you don’t recognize, it could be a sign of a breach. In that case, update the firmware, change your passwords and restart the router. If you’re not comfortable doing this yourself, call your internet provider for help.
6) Reporting to authorities: The FBI asks that victims or those who suspect a compromise report incidents to the Internet Crime Complaint Center, which can help authorities track and mitigate broader threats.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaway
This isn’t just about asking everyone to upgrade their old gear. It’s about the bigger issue of who’s actually responsible when outdated devices turn into security risks. Most people don’t think twice about the router sitting in a corner, quietly doing its job years past its prime. But attackers do. They see forgotten hardware as easy targets. The real challenge isn’t just technical. It’s about how manufacturers, service providers and users all handle the long tail of aging tech that still lives on in the real world.
Should manufacturers be held accountable for keeping routers secure against cyber threats? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The first Dolby FlexConnect soundbar is coming from LG
Dolby Atmos FlexConnect technology debuted this year with the TCL Z100 speakers, and now we’re getting our first FlexConnect soundbar thanks to LG. The new H7 soundbar — which runs on the same Alpha 11 Gen 3 chip as LG’s OLEDs and new Micro RGB LED — is a part of the LG Sound Suite, a modular home audio system the company will debut at CES 2026. In addition to the soundbar, the Sound Suite will include the M5 and M7 surround speakers and the W7 subwoofer. All of the speakers feature Peerless Audio components.
The two main drawbacks of TCL’s Dolby FlexConnect implementation were the limitation of only allowing four connected speakers, including a sub, and the need for a 2025 QM series TCL TV. So you needed to pick between better sound coverage with a fourth speaker or more bass performance with a sub. LG’s Sound Suite, on the other hand, will allow you to connect the soundbar with up to four surround speakers and a subwoofer for a potential 13.1.7-channel system.
And while the speakers can be used with a compatible LG TV (including the 2026 premium LG TV lineup and 2025’s C5 and G5 OLEDs), it isn’t required. It’s possible to use the H7 soundbar with any TV — or without — and have it act as what’s called the lead device to connect the surround speakers and sub. LG says there are 27 different speaker configurations possible, from using two speakers as a stereo pair up to the full system with soundbar, surrounds, and sub.
In my experience with the TCL Z100, calibrating FlexConnect speakers to your space is also fast. Once they’re in place and plugged in, a short musical clip is played for a few seconds and then setup is complete. The system is able to know where the speakers are placed and how to optimize the surround and Atmos sound for your room. With other room correction software, the process can take much longer, requiring taking sound readings from multiple locations in the room.
LG is using ultra-wideband technology to adjust the sweet spot based on your listening position that it’s calling Sound Follow. What will be interesting to see with the LG Sound Suite’s Dolby FlexConnect implementation is how customizable it is after setup (for instance, adjusting subwoofer levels).
I’ll be hearing the system at CES and plan on reviewing the system when it’s available to see how well the technology translates into a home.
Technology
The fake refund scam: Why scammers love holiday shoppers
NEWYou can now listen to Fox News articles!
The holiday shopping season should feel exciting, but for scammers, it’s rush hour. And this year, one trick is hitting more inboxes and phones than ever: the fake refund scam. If you’ve ever seen an unexpected “Your refund has been issued,” “Your payment failed” or “We owe you money” email or text during November or December, it wasn’t an accident.
Scammers know you’re buying more, tracking more packages and juggling more receipts than at any other time of year. That chaos makes fake refund scams incredibly effective and incredibly dangerous.
Here’s why these scams are spreading, how to spot them instantly and the one thing you can do today to stop scammers from targeting you in the first place.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE
Fake refund emails can look convincing during the holidays, making it easy to fall for a scam when your inbox is overflowing. (Kurt “CyberGuy” Knutsson)
Why refund scams skyrocket during the holidays
Scammers strike when Americans are distracted, rushed and making dozens of purchases. Black Friday, Cyber Monday and holiday gift-buying create the perfect storm:
1) You’re expecting legitimate refunds
Holiday shopping means:
- Items going out of stock
- Orders getting canceled
- Packages arriving late
- Prices changing
- Stores offering “Best Price Guarantee” refunds.
Scammers know this. When you’re already expecting refund emails, their fake ones blend right in.
2) You’re spending more, which means bigger targets
A study shows that this year, Americans will spend 3.6% more than the previous year on holiday shopping. A $200 to $500 purchase is completely normal during this season. Other reports show a decrease in spending, but note that people spend, on average, over $600 during the Black Friday promotions alone.
Expenses stack up, new things arrive, some get returned and a “$249 refund issued” message doesn’t look suspicious—it looks plausible. But it’s crucial you check if that message is real. Never click any links without a thorough look at the email address, name and content of the message.
3) Your inbox is overflowing
Have you been eyeing a new home appliance? Or a present for a loved one? Have you saved anything in your cart just to see if the price drops? Thanks to Black Friday, your inbox is probably filled with:
- Promotional codes
- Offers
- Shipping updates
- Order confirmations
- Receipts
- Return notifications.
It’s easy to lose track of your orders and packages amidst the influx of emails. And when you’re skimming more than 200 promotions, scams become harder to catch.
4) They know exactly what you purchased
Scammers get their information from data brokers, companies that collect, package and sell your personal information. Your profile can include anything from your name, contact information, to your purchase history and even your financial situation.
In general, data brokers and shopping apps sell patterns, including:
- Where you shop
- How much you spend
- What categories you buy
- Recent purchases
- Your email, phone number and address.
And scammers buy that information to craft compelling and personalized attacks. That’s why their fake refund emails often mimic retailers you actually used.
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Scammers use urgent warnings and realistic details to pressure you into clicking links that steal your personal information. (Kurt “CyberGuy” Knutsson)
How the fake refund scam works
Scammers usually follow one of three playbooks:
“Your refund is ready-verify your account.” You click a link, and you’re taken to what looks like Amazon, Walmart, UPS, Target or Best Buy. And when you enter your login, scammers can steal your credentials by manipulating you.
“We overcharged you. Click here for your refund.” It asks for your debit card number, your bank login and your PayPal credentials. Or worse: it installs malware that steals them automatically.
Phone version: “We issued a refund by mistake.” You get a call from someone pretending to be Amazon customer service, PayPal support, or even your bank. They say they “refunded too much money” and need you to send back the difference. Some even screen-share to drain bank accounts in real time.
These scams cost Americans hundreds of millions of dollars every year. The FTC reports that impostor scams (which are related to online shopping) accounted for the second-highest reported losses, resulting in $2.95 billion being lost in 2024.
What these emails look like so you can spot them fast
Scammers are getting more sophisticated. Fake refund messages often include:
- Your correct name
- A real store logo
- A real order amount
- A believable order number
- “Click to view refund” buttons
- Deadline pressure like “respond within 24 hours.”
Here’s the giveaway: No legitimate retailer requires you to enter banking info to receive a refund, ever.
Note that scams often ask you to:
- Confirm a payment
- Verify personal info
- Log in through a link
- Provide banking details
- Download an invoice.
The simplest way to protect yourself before the holiday peak
Deleting your data manually from data broker sites is technically possible, but extremely tedious. Some require government ID uploads, faxed forms, multiple follow-up requests and updates every 30 to 90 days because they relist your data.
This is why most people almost never do it. A data removal service, however, automates the entire process. These services:
- Identify which broker sites have your info
- Send official deletion requests on your behalf
- Force them to remove your data
- Continually monitor and re-request removals
- Block brokers from relisting you
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
Criminals often rely on data from broker sites to personalize refund scams, which is why reducing your digital footprint matters. (Kurt “CyberGuy” Knutsson)
How to protect yourself this season (3 quick steps)
Remember to follow these few simple steps to safeguard yourself against targeted scams.
1) Never click refund links in emails or texts
Go directly to your retailer’s website and check your actual order history. Verify the email address of the sender and only communicate with official representatives of the retailer.
2) Turn on multi-factor authentication
Set up two-factor authentication (2FA) for all of your accounts. With the help of 2FA, you’ll need to authorize logins via email, text message or generated PINs. So, even if you accidentally enter your password somewhere fake, 2FA can stop the breach.
3) Limit how scammers can find you
This is the part most people skip—and it’s why they stay targets. Removing your personal info from data broker sites cuts off scammers’ access to your real details. A data removal service automates and makes the process ongoing, which is why I recommend it to my most privacy-conscious readers.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Kurt’s key takeaways
Refund scams explode during the holiday shopping season because scammers rely on two things: Chaos in your inbox and your personal data being sold behind your back. You can’t stop scammers from sending fake emails, but you can stop them from targeting you specifically. Before peak holiday shopping hits, take a moment to clean up your data trail. You’ll end up with fewer scams, fewer risks and far more peace of mind.
Have you received a suspicious refund email or text this season? Share your experience so we can help warn others in the comments below. Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Rad Power Bikes files for bankruptcy protection
Rad Power Bikes, the once dominant electric bicycle brand in the US, filed for Chapter 11 bankruptcy protection this week as it seeks to sell of its company. The move comes less than a month after Rad Power said it could not afford to recall its older e-bike batteries that had been designated a fire risk by the US Consumer Protection Safety Commission.
The bankruptcy, which was first reported by Bicycle Retailer, was filed in US Bankruptcy Court for the Eastern District of Washington, near the company’s headquarters in Seattle. Rad Power lists its estimated assets at $32.1 million and estimated liabilities at $72.8 million. Its inventory of e-bikes, spare parts, and accessories is listged at $14.2 million, Bicycle Retailer says.
It’s a stunning reversal for the once leading e-bike company in the US. Mike Radenbaugh founded the company in 2015 after several years of selling custom-made e-bikes to customers on the West Coast. Rad Power quickly grew to over 11 distinct models, including the fat-tire RadRover, the long-tail RadWagon, and the versatile RadRunner. Rad Power Bikes raised an approximate total of $329 million across several funding rounds, primarily in 2021, with major investments from firms like Fidelity, Morgan Stanley, and T. Rowe Price.
But in the wake of the post-covid bike boom, things started to go south. There were supply chain disruptions, safety recalls, several rounds of layoffs, and executive turnover. Last month, Rad Power said it was facing “significant financial challenges” that could lead to its imminent closure without a cash infusion.
The CPSC warning apparently was the nail in the coffin. The company’s older batteries could “unexpectedly ignite and explode,” the agency warned, citing 31 fires, including 12 reports of property damage totaling $734,500. There weren’t any injuries, but the company said it couldn’t afford a costly recall.
Rad Power could still live on if its able to find a buyer for its assets and brand. Dutch e-bike make VanMoof was able to find a buyer following its 2023 bankruptcy. And Belgium’s Cowboy is in talks to be acquired by a French holding company of several bike brands. Rad Power will continue to operate as it restructures its debts under court supervision, and in a statement to Bicycle Retailer said it will continue to sell bikes and work with customers and vendors as it moves forward with the process.
-
Iowa3 days agoAddy Brown motivated to step up in Audi Crooks’ absence vs. UNI
-
Washington1 week agoLIVE UPDATES: Mudslide, road closures across Western Washington
-
Iowa4 days agoHow much snow did Iowa get? See Iowa’s latest snowfall totals
-
Maine1 day agoElementary-aged student killed in school bus crash in southern Maine
-
Maryland3 days agoFrigid temperatures to start the week in Maryland
-
Technology7 days agoThe Game Awards are losing their luster
-
South Dakota4 days agoNature: Snow in South Dakota
-
Nebraska1 week agoNebraska lands commitment from DL Jayden Travers adding to early Top 5 recruiting class