The FBI issued a formal Public Service Announcement on March 12, 2026, warning consumers and businesses that their internet-connected devices — including smart TVs, digital picture frames, smartphones, tablets, and routers — may have been silently recruited into residential proxy networks used to commit fraud and cybercrime.
The PSA explains that residential proxy operators acquire device IP addresses in two ways: through SDK partnerships with mobile app developers (who embed proxy code in exchange for payment per download) and through malware that infects devices without user consent.
Once enrolled, a victim’s home IP address is rented to criminals who use it to bypass fraud detection, conduct account takeovers, and purchase restricted items at scale.

How Criminals Hijack IoT Devices Without Your Knowledge
The most common vector highlighted by the FBI is free streaming apps that claim to provide sports, movies, or TV shows at no cost. These apps frequently contain malware or backdoors that silently share your internet bandwidth with a proxy network. You see the content; they get your IP address.
For businesses, the risk is higher. A single compromised router on a corporate network can create a persistent residential proxy exit node that is difficult to detect through normal security monitoring.
The FBI specifically warned that banks and platforms are less likely to flag suspicious activity when it comes from a residential IP address in the same city as the victim.
Steps to Protect Your Devices and Business Network
The FBI recommends avoiding free streaming devices from unknown manufacturers, keeping all IoT firmware updated, and using only trusted app stores.
Businesses should enforce strong device policies, implement network segmentation, block known proxy IP ranges at the firewall level, and keep software updated on all connected devices.
For SEO agencies and affiliate marketers who legitimately use proxy tools for data collection, this PSA is a useful audit trigger.
Review your proxy vendor’s IP sourcing policies, confirm they operate through ISP partnerships rather than SDK or malware channels, and document your proxy usage for compliance purposes.
More News To Read: