{"id":15957,"date":"2026-03-13T16:42:20","date_gmt":"2026-03-13T16:42:20","guid":{"rendered":"https:\/\/newestek.com\/?p=15957"},"modified":"2026-03-13T16:42:20","modified_gmt":"2026-03-13T16:42:20","slug":"cyber-criminals-too-are-working-from-home-your-home","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15957","title":{"rendered":"Cyber criminals too are working from home\u2026 your home"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>The FBI is so concerned about the threat of residential proxy attacks and the dangers posed by cyber criminals using the technique that it has <a href=\"https:\/\/www.ic3.gov\/PSA\/2026\/PSA260312\" target=\"_blank\" rel=\"noreferrer noopener\">posted guidance on its website<\/a>.<\/p>\n<p>Residential proxies are used by cybercriminals to reroute traffic between individuals and the websites they visit to make it appear to originate elsewhere? By taking over IoT devices, smartphones, or home routers, cybercriminals can mask their illegal online activities. But it\u2019s not just consumers who are at risk: Enterprises can be the targets of those illegal activities \u2014 and their devices can be taken over too. Older devices are particularly <a href=\"https:\/\/www.csoonline.com\/article\/3982368\/fbi-warns-that-end-of-life-devices-are-being-actively-targeted-by-threat-actors.html\">soft targets<\/a>.<\/p>\n<p>The FBI urged enterprises to install software updates as they become available to help protect devices from being infected, and to enforce strong device policies to stop employees connecting unauthorized devices to corporate networks. It also encouraged them to segment networks, block IP addresses known to be associated with residential proxy networks, and implement stronger firewall rules.<\/p>\n<p>There has been one major proxy attack already this year. In January, <a href=\"https:\/\/www.pcworld.com\/article\/3048212\/9-million-android-phones-were-secretly-hijacked-by-proxy-network.html\">nine million Android devices<\/a> were exposed. The threat to enterprises is deep-seated. Last month, cyber security company Spur identified vulnerable proxy exposure across 671 government entities, 263 energy and utility organizations, and nearly 1,900 education environments.<\/p>\n<p>\u201cResidential proxies are effective because they let bad actors blend into normal internet traffic. A lot of security teams know how to look for suspicious infrastructure. It gets harder when the traffic comes through real residential connections that appear legitimate on the surface,\u201d Spur co-founder <a href=\"https:\/\/www.linkedin.com\/in\/riley-kilmer-419a31176\" target=\"_blank\" rel=\"noreferrer noopener\">Riley Kilmer<\/a> said via email.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The FBI is so concerned about the threat of residential proxy attacks and the dangers posed by cyber criminals using the technique that it has posted guidance on its website. Residential proxies are used by cybercriminals to reroute traffic between individuals and the websites they visit to make it appear to originate elsewhere? By taking over IoT devices, smartphones, or home routers, cybercriminals can mask&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15957\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15957","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15957"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15957\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}