Cyber Criminals Targeting Millions of Home Internet Devices
- Reese Robertson
- Jun 9
- 2 min read

Would You Know if Your Router Was Being Used in a Cyberattack?
Most business owners wouldn’t. And that’s exactly why cybercriminals love targeting internet-connected devices that fly under the radar—like routers, firewalls, and switches.
A recent alert from national cybersecurity agencies revealed that millions of small office internet devices are being silently hijacked by a Chinese state-backed threat group called APT31 (aka Violet Typhoon).
These compromised devices are then used to launch global cyberattacks—without the business ever knowing.
Not Just Big Corporations—Small Businesses Are Prime Targets
These attacks aren’t focused on massive enterprise firewalls. They’re hitting everyday business gear: TP-Link. Cisco. Netgear. D-Link.
Devices still using default passwords. Outdated firmware. No security monitoring.
When your device is compromised, it can:
Become part of a botnet used in worldwide attacks
Leak your sensitive business data
Open the door to ransomware or compliance violations
Go completely undetected—until the damage is done
How Hackers Are Getting In
The attack playbook is simple:
Target unpatched firmware vulnerabilities
Exploit default or weak login credentials
Scan for devices no longer receiving security updates
Once breached, your device becomes a remote-controlled attack tool—a threat to your network and others.
Real Business, Real Risk
At Evolving Technology Solutions, we recently helped a Michigan-based accounting firm dealing with random network slowdowns.
A full assessment revealed:
Their aging router had been hijacked into a global botnet
It was silently leaking data and participating in coordinated attacks
What we did:
Replaced their compromised networking hardware
Locked down their firewall and wireless networks
Set up automated firmware updates and 24/7 monitoring
The result? Faster performance, compliance readiness, and full visibility into their IT security.
What You Should Do Right Now
Whether you’re in healthcare, finance, legal, or manufacturing—your network gear might already be vulnerable.
Here’s what we recommend:
✅ Change your router and firewall admin passwords
✅ Schedule regular firmware updates
✅ Replace any device no longer receiving security patches
✅ Segment your network so attackers can’t move laterally
✅ Invest in 24/7 threat monitoring and alerts
✅ Book a proactive risk assessment with a cybersecurity expert
Don’t Let a $100 Router Cost You a $100,000 Breach
Cyberattacks don’t always come in the form of phishing emails or malware.
Sometimes they exploit the most overlooked part of your business—your internet hardware.
Let Evolving Technology Solutions Help
We specialize in securing Michigan-based small businesses from the ground up.Whether you’re in legal, healthcare, finance, or manufacturing—we’ll protect your people, your data, and your growth.
Sources:
Millions of Home Internet Devices Targeted by Cyber Criminals – LinkedIn Article
NCSC/NSA/CISA Joint Advisory
Comments