Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 16, 2025

    Linux Boot Process? Best Geeks Know It!

    May 16, 2025

    Microsoft’s Surface lineup reportedly losing another of its most interesting designs

    May 16, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.
    Cyber Security

    BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.

    MichaBy MichaMay 10, 2025No Comments4 Mins Read
    BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.


    Summary: U.S. and Dutch authorities have successfully dismantled a criminal proxy network leveraging IoT and end-of-life devices, revealing the intricate workings of a lucrative botnet. Following the arrest of key operators and the seizure of domains, this operation underscores the cybersecurity risks associated with compromised IoT technology. Discover how this affects internet security and what safeguards users should implement.

    The Dismantling of a Major Cybercrime Network

    A joint law enforcement operation by Dutch and U.S. authorities has successfully dismantled a malicious proxy network driven by thousands of infected Internet of Things (IoT) and end-of-life (EoL) devices. This operation reveals how cybercriminals exploit vulnerabilities to create a robust botnet that offers anonymity to malicious actors.

    Key Arrests and Financial Implications

    As part of this crackdown, several Russian nationals, including Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, and others, have been charged by the U.S. Department of Justice (DoJ) for operating and profiting from these proxy services. Their operations reportedly earned over $46 million through subscriptions ranging from $9.95 to $110 monthly, in a service available since 2004.

    The FBI uncovered numerous hacked business and residential routers across Oklahoma, which were unknowingly compromised to operate malware.

    Detection and Analysis of the Botnet

    The Lumen Technologies Black Lotus Labs reported that the botnet averaged 1,000 unique bots interacting with command-and-control (C2) infrastructure located in Turkey, with over half of the compromised devices based in the United States. These statistics emphasize the scale of the issue and the geographical distribution of affected users.

    Operation Moonlander

    Two specific services—anyproxy.net and 5socks.net—were disrupted in a coordinated effort dubbed Operation Moonlander. Both platforms are believed to belong to the same botnet, which was responsible for selling access under multiple service names.

    Exploitation of Vulnerable Devices

    The compromised IoT devices were infected with a malware variant known as TheMoon. This malware facilitates remote access and enables the installation of proxy software, empowering cybercriminals to engage in illicit activities anonymously.

    According to Lumen, TheMoon malware exploits EoL devices using various vulnerabilities, allowing for easy infiltration and recruitment into the botnet. A network of servers based in Turkey communicates with the infected devices, probing them for further vulnerabilities.

    Cybersecurity Recommendations

    In an advisory, the FBI highlighted the importance of securing routers and other internet-exposed devices, particularly EoL models. It is crucial for users to implement the following cybersecurity measures:

    • Regularly reboot and secure routers by setting strong, unique passwords.
    • Keep firmware updated to patch known vulnerabilities.
    • Consider replacing EoL devices with modern alternatives that receive security updates.

    Understanding the Impact of Proxy Networks

    Proxy services significantly threaten internet security, enabling malicious activities while hiding behind residential IPs. As the number of EoL devices continues to grow alongside the proliferation of IoT, the landscape remains ripe for exploitation by cybercriminals.

    Found this article interesting? Follow us on Twitter  and LinkedIn for more exclusive content.

    FAQ

    What is a botnet and how does it work?

    A botnet is a network of compromised devices controlled by cybercriminals, typically used for malicious activities such as DDoS attacks, data theft, or sending spam. These devices are infected with malware, allowing the botnet operator to control them remotely without the user’s permission.

    How can I protect my IoT devices from being exploited?

    To secure IoT devices, use unique and complex passwords, keep the firmware updated, and regularly reboot the devices. Disconnect them from the internet when not in use, and consider upgrading to newer devices that receive ongoing security support.

    Why are end-of-life devices particularly vulnerable?

    End-of-life (EoL) devices are no longer supported by manufacturers, meaning they do not receive security updates. This lack of patches makes them especially susceptible to exploitation through known vulnerabilities, making them easy targets for attackers.

    This rewrite aims to improve SEO by including relevant keywords like “botnet,” “cybersecurity,” and “IoT devices,” while maintaining a clear structure and engaging tone. The article remains informative and accessible, catering to tech-savvy readers.



    Read the original article

    0 Like this
    7000Device Botnet BREAKING Dismantled EoL IoT proxy systems U.S
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleGoogle Messages’ latest feature is here to save you from yourself
    Next Article A new AI translation system for headphones clones multiple voices simultaneously

    Related Posts

    Cyber Security

    Where To Look For The Next Cybersecurity Unicorn

    May 16, 2025
    Cyber Security

    US charges 12 more suspects linked to $230 million crypto theft

    May 16, 2025
    Cyber Security

    Top 10 Best Practices for Effective Data Protection

    May 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.