Cyberside Chats: Cybersecurity Insights from the Experts

Network for Rent: The Criminal Market Built on Outdated Routers


Listen Later

Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Learn how these botnets work, why they matter for your enterprise, and what to do next. 

Takeaways 

  • Replace outdated routers 
  •   End-of-life routers should be identified and replaced across your organization, including remote offices and unmanaged home setups. These devices no longer receive patches and are prime targets for compromise. 
    • Restrict remote administration 
    •   If remote access is needed, tightly control it—limit by IP address, use VPN access, and require MFA. Avoid exposing admin interfaces directly to the internet unless absolutely necessary. 
      • Patch and harden infrastructure 
      •   Apply all available firmware updates and follow vendor security guidance. Where possible, segment or monitor legacy network devices that can’t be immediately replaced. 
        • Don’t trust domestic IPs 
        •   Traffic from domestic or residential IP ranges is no longer inherently safe. Compromised routers make malicious activity appear to come from trusted regions. 
          • Add proxy abuse to threat intel 
          •   Incorporate indicators of compromise from Lumen and FBI alerts into detection rulesets. Treat proxy abuse as a key TTP for credential theft, fraud, and malware C2. 
          • Report suspected compromise 
          •   If you identify affected infrastructure or suspicious traffic, report it to IC3.gov. Include IPs, timestamps, device types, and any supporting forensic detail. 

            #CybersideChats #Cybersecurity #Tech #Cyber #CyberAware #CISO #CIO #FBIalert #FBIwarning #Malware #Router

            ...more
            View all episodesView all episodes
            Download on the App Store

            Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside

            • 5
            • 5
            • 5
            • 5
            • 5

            5

            2 ratings


            More shows like Cyberside Chats: Cybersecurity Insights from the Experts

            View all
            No Agenda Show by Adam Curry & John C. Dvorak

            No Agenda Show

            5,951 Listeners

            Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

            Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

            370 Listeners

            The DSR Network by The DSR Network

            The DSR Network

            1,760 Listeners

            Conspirituality by Derek Beres, Matthew Remski, Julian Walker

            Conspirituality

            2,037 Listeners

            What Rough Beast by Virginia Heffernan and Stephen Metcalf

            What Rough Beast

            61 Listeners