Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Firefox 142 Web Browser Is Now Available for Download, Here’s What’s New

August 19, 2025

Massive Allianz Life data breach impacts 1.1 million people

August 19, 2025

Accuracy, Cost, and Performance with NVIDIA Nemotron Models

August 19, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.
Cyber Security

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.

MichaBy MichaMay 10, 2025No Comments4 Mins Read
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.


Summary: U.S. and Dutch authorities have successfully dismantled a criminal proxy network leveraging IoT and end-of-life devices, revealing the intricate workings of a lucrative botnet. Following the arrest of key operators and the seizure of domains, this operation underscores the cybersecurity risks associated with compromised IoT technology. Discover how this affects internet security and what safeguards users should implement.

The Dismantling of a Major Cybercrime Network

A joint law enforcement operation by Dutch and U.S. authorities has successfully dismantled a malicious proxy network driven by thousands of infected Internet of Things (IoT) and end-of-life (EoL) devices. This operation reveals how cybercriminals exploit vulnerabilities to create a robust botnet that offers anonymity to malicious actors.

Key Arrests and Financial Implications

As part of this crackdown, several Russian nationals, including Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, and others, have been charged by the U.S. Department of Justice (DoJ) for operating and profiting from these proxy services. Their operations reportedly earned over $46 million through subscriptions ranging from $9.95 to $110 monthly, in a service available since 2004.

The FBI uncovered numerous hacked business and residential routers across Oklahoma, which were unknowingly compromised to operate malware.

Detection and Analysis of the Botnet

The Lumen Technologies Black Lotus Labs reported that the botnet averaged 1,000 unique bots interacting with command-and-control (C2) infrastructure located in Turkey, with over half of the compromised devices based in the United States. These statistics emphasize the scale of the issue and the geographical distribution of affected users.

Operation Moonlander

Two specific services—anyproxy.net and 5socks.net—were disrupted in a coordinated effort dubbed Operation Moonlander. Both platforms are believed to belong to the same botnet, which was responsible for selling access under multiple service names.

Exploitation of Vulnerable Devices

The compromised IoT devices were infected with a malware variant known as TheMoon. This malware facilitates remote access and enables the installation of proxy software, empowering cybercriminals to engage in illicit activities anonymously.

According to Lumen, TheMoon malware exploits EoL devices using various vulnerabilities, allowing for easy infiltration and recruitment into the botnet. A network of servers based in Turkey communicates with the infected devices, probing them for further vulnerabilities.

Cybersecurity Recommendations

In an advisory, the FBI highlighted the importance of securing routers and other internet-exposed devices, particularly EoL models. It is crucial for users to implement the following cybersecurity measures:

  • Regularly reboot and secure routers by setting strong, unique passwords.
  • Keep firmware updated to patch known vulnerabilities.
  • Consider replacing EoL devices with modern alternatives that receive security updates.

Understanding the Impact of Proxy Networks

Proxy services significantly threaten internet security, enabling malicious activities while hiding behind residential IPs. As the number of EoL devices continues to grow alongside the proliferation of IoT, the landscape remains ripe for exploitation by cybercriminals.

Found this article interesting? Follow us on Twitter  and LinkedIn for more exclusive content.

FAQ

What is a botnet and how does it work?

A botnet is a network of compromised devices controlled by cybercriminals, typically used for malicious activities such as DDoS attacks, data theft, or sending spam. These devices are infected with malware, allowing the botnet operator to control them remotely without the user’s permission.

How can I protect my IoT devices from being exploited?

To secure IoT devices, use unique and complex passwords, keep the firmware updated, and regularly reboot the devices. Disconnect them from the internet when not in use, and consider upgrading to newer devices that receive ongoing security support.

Why are end-of-life devices particularly vulnerable?

End-of-life (EoL) devices are no longer supported by manufacturers, meaning they do not receive security updates. This lack of patches makes them especially susceptible to exploitation through known vulnerabilities, making them easy targets for attackers.

This rewrite aims to improve SEO by including relevant keywords like “botnet,” “cybersecurity,” and “IoT devices,” while maintaining a clear structure and engaging tone. The article remains informative and accessible, catering to tech-savvy readers.



Read the original article

0 Like this
7000Device Botnet BREAKING Dismantled EoL IoT proxy systems U.S
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleGoogle Messages’ latest feature is here to save you from yourself
Next Article A new AI translation system for headphones clones multiple voices simultaneously

Related Posts

Cyber Security

Massive Allianz Life data breach impacts 1.1 million people

August 19, 2025
Cyber Security

Pentests Reveal Top 5 Most Impacted Industries In 2025

August 18, 2025
Cyber Security

Check your risk blind spot

August 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.