Technology
Google dismantles 9M-device Android hijack network
NEWYou can now listen to Fox News articles!
Free apps are supposed to cost you nothing but storage space. But in this case, they may have cost millions of people control over their own internet connections.
Google says it has disrupted what it believes was the world’s largest residential proxy network, one that secretly hijacked around 9 million Android devices, along with computers and smart home gadgets. Most people had no idea their devices were being used since the apps worked normally, and nothing looked broken.
But behind the scenes, those devices were quietly routing traffic for strangers, including cybercriminals.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE
Google says it disrupted a massive residential proxy network that secretly hijacked about 9 million Android and smart devices. (AaronP/Bauer-Griffin/GC Images)
How your device became part of a proxy network
According to Google’s Threat Intelligence Group, the network was tied to a company known as IPIDEA. Instead of spreading through obvious malware, it relied on hidden software development kits, or SDKs, that were embedded inside more than 600 apps. These apps ranged from simple utilities to VPN tools and other free downloads. When you installed one, the app performed its advertised function. But it also enrolled your device into a residential proxy network.
That means your phone, computer or smart device could be used as a relay point for someone else’s internet traffic. That traffic might include scraping websites, launching automated login attempts or masking the identity of someone conducting shady online activity. From the outside, it looked like that activity came from your home IP address. You wouldn’t see it happening, and in many cases, you wouldn’t notice any major performance issues.
Google says in a single seven-day period earlier this year, more than 550 separate threat groups were observed using IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are attractive because they make malicious traffic look like normal consumer activity. Instead of coming from a suspicious data center, it appears to come from someone’s living room.
What Google did to shut it down
Google says it took legal action in a U.S. federal court to seize domains used to control the infected devices and route proxy traffic. It also worked with companies like Cloudflare and other security firms to disrupt the network’s command-and-control systems. Google claims it also updated Play Protect, the built-in Android security system, so that certified devices would automatically detect and remove apps known to include the malicious SDKs.
However, Google also warned that many of these apps were distributed outside the official Play Store. That matters because Play Protect can only scan and block threats tied to apps installed through Google Play. Third-party app stores, unofficial downloads and uncertified Android devices carry far greater risk.
IPIDEA has claimed its service was meant for legitimate business use, such as web research and data collection. But Google’s research suggests the network was heavily abused by criminals. Even if some users knowingly installed bandwidth-sharing apps in exchange for rewards, many did not receive clear disclosure about how their devices were being used.
Google’s investigation also found significant overlap between different proxy brands and SDK names. What looked like separate services were often tied to the same infrastructure. That makes it harder for consumers to know which apps are safe and which are quietly monetizing their connection.
300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
Hidden software inside more than 600 apps allegedly turned phones and computers into internet relays for cybercriminals. (David Paul Morris/Bloomberg via Getty Images)
7 ways you can protect yourself from Android proxy attacks
If millions of devices can be quietly turned into internet relay points, the big question is, how do you make sure yours isn’t one of them? These steps reduce the risk that your phone, TV box or smart device gets pulled into a proxy network without you realizing it.
1) Stick to official app stores
Only download apps from the Google Play Store or other trusted app marketplaces. Some apps hide small pieces of code that can secretly use your internet connection. These are often spread through third-party app stores or direct app files called “APKs,” which are Android app files installed manually instead of through the Play Store. When you sideload apps this way, you bypass Google’s built-in security checks. Sticking to official stores helps keep those hidden threats off your device.
2) Avoid “earn money by sharing bandwidth” apps
If an app promises rewards for sharing your unused internet bandwidth, that’s a major red flag. In many cases, that is exactly how residential proxy networks recruit devices. Even if it sounds legitimate, you are effectively renting out your IP address. That can expose you to abuse, blacklisting or deeper network vulnerabilities.
3) Review app permissions carefully
Before installing any app, check what permissions it requests. A simple wallpaper app should not need full network control or background execution privileges. After installation, go into your phone’s settings and audit which apps have constant internet access, background activity rights or special device permissions.
4) Install strong antivirus software
Today’s mobile security tools can detect suspicious app behavior, unusual internet activity and hidden background services. Strong antivirus software adds an extra layer of protection beyond what’s built into your device, especially if you’ve installed apps in the past that you’re unsure about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Keep your devices updated
Android security updates patch vulnerabilities that proxy operators may exploit. If you’re using an older phone, tablet or Android TV box that no longer receives updates, it may be time to upgrade. Unpatched devices are easier targets for hidden SDK abuse and botnet enrollment.
6) Use a strong password manager
If your device ever becomes part of a proxy network or is otherwise compromised, attackers often try to pivot into your accounts next. That’s why you should never reuse passwords. A password manager generates long, unique passwords for every account and stores them securely, so one breach does not unlock your email, banking or social media. Many password managers also include breach monitoring tools that alert you if your credentials appear in leaked databases, giving you a chance to act before real damage is done. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
7) Remove apps you don’t fully trust
Go through your installed apps and delete or uninstall anything you don’t recognize or haven’t used in months. The fewer apps running on your device, the fewer opportunities there are for hidden SDKs to operate. If you suspect your device has been compromised, consider a full reset and reinstall only essential apps from trusted sources.
ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
Threat groups and state-linked actors allegedly used compromised devices to mask online activity and automate attacks. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)
Kurt’s key takeaway
Residential proxy networks operate in a gray area that sounds harmless on paper but can quickly become a shield for cybercrime. In this case, millions of everyday devices were quietly enrolled into a system that attackers used to hide their tracks. Google’s takedown is a major move, but the broader market for residential proxies is still growing. That means you need to be cautious about what you install and what permissions you grant. Free apps are rarely truly free. Sometimes, the product being sold is you and your internet connection.
Have you ever installed an app that promised rewards for sharing bandwidth, or used a free VPN without thinking twice about it? Let us know your thoughts by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
OpenAI’s former Sora boss is leaving
I am immensely grateful to Sam, Mark, Aditya and Jakub for fostering a research environment that allowed us to pursue ideas off-the-beaten path from the company’s mainline roadmap. It’s tempting in life to mode collapse to the most important thing, but cultivating entropy is the only way for a research lab to thrive long-term, and Sam deeply understands this. Sora was a project that could not have happened anywhere but OpenAI, and I will always deeply love this place for that.
Technology
How scammers target grieving victims through online games
NEWYou can now listen to Fox News articles!
For many people, games like Words With Friends are a relaxing way to pass the time. You play a few rounds, chat with opponents and enjoy a little mental exercise. But scammers have quietly turned these casual games into hunting grounds.
They look for players who appear friendly, are older, or are recently widowed. Then they start a conversation. At first, it feels harmless. A compliment. A friendly message. A question about where you live.
Weeks later, the conversation often shifts to money. Angela from Lake Mary, MN, recently wrote to us about a situation that has her entire family worried.
“My sister, who lost her Doctor husband of 56 years 1.5 years ago, is communicating with a man she met on an internet game, “Words with Friends”. She is buying him gift cards and giving him the number so he can cash them. My nephews took her to their local police dept and they told her it’s a scam! Dangerous and to STOP. She doesn’t believe anyone!!! Is there a way to find out where these emails and texts are coming from??? We are very concerned! Hope you have some advice.” Angela, Lake Mary, MN
Angela’s situation is heartbreaking. Sadly, it is also very common. Authorities consider these romance scams. They cost victims billions each year. According to the Federal Trade Commission, romance scams remain one of the most expensive fraud categories reported by consumers.
NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS
Scammers are using casual word games like Words With Friends to target older and grieving players, often turning friendly chats into costly gift card fraud. (Anastasiia Havrysh/Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
How the Words With Friends scam usually begins
Scammers often start inside casual apps where conversation feels natural. Games like Words With Friends allow players to chat during matches. That simple feature creates the perfect entry point for criminals.
The pattern often follows the same steps. First, the scammer begins a friendly conversation during a game. Next, they ask to move the conversation to email, text or a messaging app. Then they begin building emotional trust. Many claim to be widowed, traveling for work or working overseas.
Eventually, a crisis appears. They claim they need help paying a bill, fixing a problem or buying supplies. Finally, they ask for money through gift cards. Once the gift card numbers are sent, the money is usually gone.
Why gift cards are a major warning sign
Gift cards are one of the biggest red flags in scams. Criminals prefer them because they are fast and difficult to trace. Once someone shares the numbers on the back of the card, the scammer can redeem the balance immediately.
There is almost no way to recover the money after that. Legitimate people do not ask strangers or online acquaintances for gift cards. If someone you met online asks for them, treat it as a serious warning sign.
Can you find where the emails or texts are coming from?
Angela asked whether it is possible to trace the messages. Sometimes it is. Often it is difficult. Scammers work hard to hide their identity and location.
They often use:
- VoIP numbers such as Google Voice
- Email accounts created specifically for scams
- VPN services that hide their true location
Because of this, a message may appear to come from the United States even if the scammer is overseas. Still, there are a few steps that can sometimes uncover clues.
Check the full email headers for clues
If the communication is happening by email, the full email header may reveal the route the message traveled. Headers sometimes contain the originating IP address. That address may show the country where the email began its journey.
Free tools such as Google’s Messageheader analyzer, MXToolbox and Microsoft’s Message Header Analyzer can break down email headers and show the path a message traveled across mail servers.
While this information will not usually reveal the scammer’s true identity, it can sometimes indicate the network or country where the email originated.
APPLE PAY TEXT SCAM ALMOST COST HER $15,000
Romance scammers are moving from dating apps to online games, where casual conversation can quickly turn into requests for gift cards and money. (Jeffrey Greenberg/Universal Images Group via Getty Images)
Reverse search the photos
Romance scammers almost always steal photos from real people. Those photos often come from social media profiles or professional websites. You can upload the images to reverse search tools such as Google Images.
If the same photo appears under multiple names or accounts, that is strong evidence of a scam. Showing that proof sometimes helps victims reconsider what is happening.
Search the phone number or username
Another simple step is searching for the contact information online. Enter the phone number, email address or username along with words like scam or romance scam.
Many scammers reuse the same identity across multiple victims. In some cases, other people have already reported the same name or number. Finding those reports can help reveal the pattern.
Report the account inside the game
If the conversation began on Words With Friends, the account can be reported directly through the game. Companies investigate reports and often remove accounts involved in fraud.
That action will not always stop the scammer completely. However, it can prevent them from targeting additional players.
The hardest part of these scams
The emotional connection can be stronger than the evidence. Scammers spend weeks building trust. They learn about the victim’s life, their losses and their fears. Then they present themselves as someone who understands.
For someone who is grieving or lonely, that connection can feel very real. Experts often recommend approaching the situation carefully.
Avoid accusations or heated arguments. Instead, focus on protecting finances and calmly presenting evidence.
Family members may also help by monitoring financial activity or encouraging a pause before sending money.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Experts warn that scammers often build trust for weeks inside games and messaging apps before inventing a crisis and asking victims to send gift cards. (Suzanne Kreiter/The Boston Globe via Getty Images)
How to stay safe from Words With Friends and romance scams
Romance scams continue to grow. A few practical steps can help reduce the risk.
1) Be cautious with strangers in online games
Friendly chat inside games can easily become manipulation. Be careful when strangers try to move the conversation elsewhere.
2) Never send gift cards to someone you met online
Gift cards are one of the most common tools used in scams. Treat any request for them as a warning sign.
3) Reverse search profile photos
Running a quick image search can reveal stolen photos used by scammers.
4) Talk to family before sending money
A second opinion can stop a scam before it becomes expensive.
5) Report scams to authorities
If you suspect fraud, report it to the Federal Trade Commission at https://reportfraud.ftc.gov.
Reports help investigators track organized criminal networks.
6) Keep conversations inside the game platform
Scammers almost always try to move the conversation to text, email or messaging apps. Staying inside the game platform makes it easier to report suspicious behavior.
7) Monitor credit and financial accounts
Some scammers eventually ask victims for personal details such as bank information or identification documents. Monitoring your credit reports and financial accounts can help detect suspicious activity early. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
8) Reduce how much personal information appears online
Scammers often research potential victims through people-search websites and public records. Limiting the personal details that appear online can make it harder for criminals to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
9) Watch for sudden emergencies or travel stories
Romance scammers often claim they are working overseas, stuck on an oil rig or deployed in the military. These stories are designed to explain why they cannot meet in person.
Kurt’s key takeaways
Angela’s story shows how easily these scams can begin. They often start in places that feel harmless. A simple word game. A friendly chat. A conversation that slowly becomes personal. By the time money enters the picture, the emotional bond may already feel strong. That is why families must focus on patience and protection. Helping someone step back from a scam can take time, but support and evidence can make a difference.
If a friendly opponent in a simple word game started messaging you every day, would you recognize the moment when the conversation turns into a scam? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
A giant cell tower is going to space this weekend
This weekend’s scheduled Blue Origin rocket launch is rather momentous. Success would signal an end to SpaceX’s monopoly on reusable orbital launch vehicles, and set up a three-way race to make that “No Service” indicator on your phone disappear forever.
On Sunday morning, Jeff Bezos’ massive New Glenn rocket is scheduled to launch with the first-stage booster that launched and landed on the program’s second mission last November. It’s a critical test, because cost-effective booster reuse is what’s made SpaceX’s Falcon 9 so dominate.
Amazon desperately needs a reusable rocket of its own to accelerate its Leo launches. Without one, it’s only been able to launch 241 Leo satellites, putting it well behind schedule. In that same 12-month time period, SpaceX’s Falcon 9 rocket was able to deploy over 1,500 satellites to its Starlink constellation.
Sunday’s mission will carry AST SpaceMobile’s BlueBird 7 satellite to low Earth orbit. Instead of blanketing the region with thousands of small satellites like Amazon and SpaceX, AST’s plan is to deploy fewer satellites that are much more powerful. Bluebird 7 features a massive 2,400-square-foot phased-array antenna, making it the largest commercial communications array ever deployed in low Earth orbit. It’s essentially a cell tower in space, and will be the second of the company’s “Block 2” next-generation satellites to launch.
The BlueBird 7 is designed to provide 4G and 5G broadband, at speeds exceeding 120 Mbps, to the phones we already carry. AST plans to have 45 to 60 satellites launched by the end of 2026. When AST lights up its service sometime this year, it will be in direct competition with Starlink’s direct-to-cell service, already operating with T-Mobile in the US, and Globalstar, the satellite network snapped up by Amazon that keeps iPhones and Apple Watches communicating in dead zones.
-
Ohio4 days ago‘Little Rascals’ star Bug Hall arrested in Ohio
-
Arkansas1 week agoArkansas TV meteorologist Melinda Mayo retires after nearly four decades on air
-
Politics3 days agoDem fundraising giant in the hot seat as GOP lawmakers demand answers over dodged subpoena
-
Science3 days ago‘Dr. Pimple Popper’ Sandra Lee had a stroke last fall. Here’s how the TV doc is bouncing back
-
Politics6 days agoTrump blasts Spanberger ahead of Virginia meetings, says state faces tax base exodus like New York, California
-
Health1 week agoWoman discovers missing nose ring traveled to her lungs, causing month-long cough
-
Detroit, MI1 week agoByron Allen’s “Comics Unleashed” replacing Colbert’s “Late Show”
-
San Francisco, CA5 days agoPresident Trump terminates Presidio Trust