The FBI’s cyber division urges smart device owners to watch for a stealthy scam that hijacks internet signals and drains data usage. Cybercriminals target everyday Internet of Things (IoT) gadgets like smart TVs, security cameras, thermostats, refrigerators, fitness trackers, and children’s toys.
Three Key Indicators of a Compromised Device
Officials from the FBI’s Internet Crime Complaint Center (IC3) highlight three primary signs that hackers have infiltrated these devices:
1. Sudden Surge in Data Usage
Malware compels infected devices to transmit large volumes of traffic, including spam emails, attacks on websites, or communications with hackers’ servers. This activity routes through your internet connection and IP address, masking criminals’ identities while inflating your monthly data consumption.
2. Unexpected Rise in Internet Bills
A spike in data often leads to higher charges, particularly with providers that impose overage fees. Experts recommend immediately disconnecting the suspect device and filing a report via the IC3 website.
3. Sluggish WiFi and Device Performance
Hijacked gadgets run malware in the background, consuming processing power, memory, and bandwidth. This creates lag across the device or entire home network, mimicking a poor connection.
In a recent bulletin, the FBI states: ‘Cyber actors actively search for and compromise vulnerable Internet of Things (IoT) devices for use as proxies or intermediaries for Internet requests to route malicious traffic for cyber-attacks and computer network exploitation.’
These signs confirm integration into a botnet—a remote-controlled network of infected machines operating around the clock for criminal purposes.
How Hackers Infiltrate Smart Devices
Attackers exploit weak default passwords like ‘admin’ or ‘1234,’ which many users overlook. Outdated firmware creates vulnerabilities, and even new devices from makers like Apple or Samsung may ship with undiscovered zero-day flaws until patches arrive.
No phishing clicks or suspicious downloads are required; simple oversights suffice for entry.
Essential Steps to Protect Your Devices
Prevent hijackings with these proven measures:
- Restart devices and routers frequently—most malware resides in memory and clears on reboot.
- Replace all factory default passwords upon setup.
- Apply the latest software and firmware updates promptly.
- Monitor monthly data usage for anomalies.
The FBI emphasizes regular reboots, noting: ‘It is important to do this regularly as many actors compete for the same pool of devices and use automated scripts to identify vulnerabilities and infect devices.’
Any connected device, including smartphones, remains at risk from these common tech weaknesses.

