The FBI has urgently warned that many older home and small-office Wi-Fi routers that have reached their end of life and no longer receive security patches are sitting ducks for cybercriminals, with known vulnerabilities being actively exploited by malware authors to hijack these devices, fold them into botnets, install proxy services and launch or conceal other crimes, prompting officials to urge users to replace unsupported routers, update firmware, disable remote administration and adopt stronger cybersecurity practices.
Sources
https://www.slashgear.com/2104404/wifi-routers-unsafe-fbi-warning/
https://www.govtech.com/security/outdated-internet-routers-a-cybersecurity-risk-fbi-says
https://www.techradar.com/pro/security/fbi-warns-outdated-routers-are-being-hacked-and-hijacked-for-criminal-purposes
Key Takeaways
• The FBI’s alert focuses on “end-of-life” routers — models no longer supported with security updates — that are easy targets for attackers.
• Exploits often involve malware like variants of TheMoon that install proxies and fold infected routers into botnets for coordinated attacks or to mask criminal activity.
• Users are urged to replace obsolete hardware, apply firmware updates, disable remote administration features, and use strong, unique passwords to mitigate risk.
In-Depth
Outdated Wi-Fi routers have become a serious cybersecurity weak point, and the FBI’s recent warning underscores just how exposed many Americans’ home and office networks might be. Routers that were manufactured in the late 2000s and early 2010s are particularly affected because their makers no longer supply firmware updates or security patches. Without ongoing support, these devices remain rife with publicly known vulnerabilities that attackers can exploit with ease. In many cases, cybercriminals scan the internet for exposed remote administration interfaces on legacy routers in order to upload malware that gives them full control of the device. Once compromised, a router can be absorbed into a botnet — a network of infected machines used to launch distributed attacks or rented out for illicit proxy services that cloak the real identities of the bad actors behind other digital crimes.
Keeping an old router “because it still works” isn’t a safe bet any longer. The FBI has even named specific models — particularly several Cisco and Linksys units — that are highly vulnerable because they stopped receiving support years ago. Because traditional antivirus and endpoint security tools don’t monitor the firmware on a router itself, such infections can go unnoticed for long periods, making everyday network traffic an unwitting conduit for criminal schemes. Users are advised not only to retire hardware that’s no longer supported but also to take immediate steps such as disabling remote administration, updating to the latest firmware on supported devices, and instituting strong, random passwords that are unique to each piece of network gear. These measures don’t just protect the router; they help secure every device connected behind it — from smartphones and laptops to smart home gadgets that might otherwise be next on a hacker’s list.
The broader lesson is that network security begins at the edge. A neglected router is more than just outdated equipment — it’s a digital gateway that, if left unsecured, can be seized by criminals as a launchpad for far more intrusive attacks on both personal and professional networks. Vigilance, regular maintenance, and a willingness to upgrade aging technology are essential steps in shoring up this often overlooked vulnerability.

