Threat IntelHIGH

APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed

Featured image for APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed
#APT28#DNS Hijacking#TP-Link#CVE-2023-50224#UK NCSC#cybersecurity#DNS hijacking#router vulnerabilities#credential theft

Original Reporting

IMInfosecurity Magazine

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupAPT28
AliasesFancy Bear, Strontium, Sofacy
AttributionRussian GRU
Target SectorsGovernment, Technology
Target RegionsUK, Ukraine
Active Since2024
Campaign NameRouter Hijacking Campaign
Primary TTPsDNS Hijacking, AitM Attacks
Tools UsedModified VPS, Malicious DNS Servers
MITRE ATT&CKT1071.001, T1557
MotivationIntelligence Gathering
🎯

Russian hackers are using weaknesses in internet routers to trick them into sending your data to the hackers instead of the real websites. They can steal your passwords and other important information. It's like if someone changed the address on your letters so they go to them instead of you!

Quick Summary

APT28 hackers have been hijacking routers to steal credentials, with new insights revealing their tactics and the vulnerabilities exploited. The UK’s NCSC warns organizations to bolster their defenses.

What Happened

The UK’s National Cyber Security Centre (NCSC) has issued a warning regarding the Russian hacking group APT28, which has been hijacking vulnerable internet routers to redirect traffic through attacker-controlled servers, ultimately stealing credentials from targeted organizations. The advisory, published on April 7, 2026, outlines two new malicious campaigns attributed to APT28, which have been exploiting public vulnerabilities in routers since at least 2024.

Who's Affected

APT28's operations primarily target small office/home office (SOHO) routers, particularly models like the TP-Link WR841N and MikroTik routers. The NCSC has noted that these attacks are opportunistic, aiming to cast a wide net before focusing on specific victims of intelligence value.

What Data Was Exposed

The attackers modify the dynamic host configuration protocol (DHCP) DNS settings of compromised routers to include actor-owned IP addresses. This allows them to intercept traffic from downstream devices, including laptops and smartphones, capturing sensitive data such as passwords and authentication tokens. The malicious DNS servers resolve requests for domain names associated with key services, such as email applications, to actor-controlled IPs.

The Flaw

The main vulnerability exploited by APT28 is CVE-2023-50224, which allows unauthenticated attackers to gain access to sensitive information via specially crafted HTTP GET requests. This flaw enables attackers to modify router settings, replacing legitimate DNS servers with malicious ones, thereby controlling how traffic is routed.

What's at Risk

Organizations using vulnerable router models are at significant risk, especially those that have not implemented robust security measures. The NCSC emphasizes that the exploitation of widely used network devices can have serious implications for cybersecurity, particularly for organizations in sensitive sectors.

Patch Status

While specific patches for the vulnerabilities exploited by APT28 have not been detailed in the advisory, the NCSC advises organizations to ensure their routers are running the latest firmware and to apply security updates promptly.

Immediate Actions

To mitigate the risks associated with these attacks, the NCSC recommends the following actions:

  • Implement browse-down architecture to limit privileged access.
  • Regularly update to the latest supported versions of firmware and software.
  • Deploy antivirus solutions and conduct regular malware scans.
  • Use allowlisting for applications.
  • Implement host-based intrusion detection systems.
  • Utilize multifactor authentication (MFA) wherever possible.

Paul Chichester, NCSC Director of Operations, stated, "This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors. We strongly encourage organizations and network defenders to familiarize themselves with the techniques described in the advisory and to follow the mitigation advice."

🔍 How to Check If You're Affected

  1. 1.Monitor DNS traffic for unusual patterns or requests to known malicious IP addresses.
  2. 2.Implement logging on routers to track configuration changes.
  3. 3.Regularly audit router firmware and configurations for unauthorized changes.

🏢 Impacted Sectors

governmentfinancecritical infrastructure

Pro Insight

The ongoing activities of APT28 underscore the importance of securing network devices against known vulnerabilities. Organizations should prioritize updating firmware and implementing multi-layered security strategies to protect sensitive data.

🗓️ Story Timeline

Story broke by Infosecurity Magazine
Covered by Help Net Security

Sources

Original Report

IMInfosecurity Magazine
Read Original

Also covered by

HEHelp Net Security

Russian hackers hijack internet traffic using vulnerable routers

Read

Related Pings

HIGHThreat Intel

Charming Kitten - Iran Group Leverages Social Engineering Tactics

Charming Kitten, an Iran-linked group, is ramping up cyber espionage efforts by using social engineering tactics. Targeting officials and researchers, they manipulate trust to access sensitive data. This shift in strategy highlights the need for enhanced cybersecurity awareness and training.

SC Media·
HIGHThreat Intel

Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft

A major international operation has disrupted the FrostArmada campaign, which hijacked routers to steal Microsoft 365 logins. This attack affected thousands of devices worldwide, primarily targeting government and IT sectors. Authorities are now working to secure the compromised infrastructure and protect users from future threats.

BleepingComputer·
HIGHThreat Intel

SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered

A Russian military-linked group is exploiting vulnerable home routers for DNS hijacking and adversary-in-the-middle attacks. Thousands of devices are affected, raising significant security concerns. Organizations must enhance their defenses against these tactics.

Microsoft Security Blog·
HIGHThreat Intel

Cybercrime - Industrialization and Its Implications Explained

Cybercrime has evolved into a serious industry affecting everyone. Experts stress the need for preparedness and public-private cooperation to combat this growing threat effectively.

Fortinet Threat Research·
HIGHThreat Intel

Russian Cyber Unit Exposed for Hijacking Home Routers

UK officials have exposed a Russian cyber unit hijacking home routers to spy on users. Weak security settings are being exploited, putting sensitive data at risk. Organizations are urged to secure their devices.

The Record·
HIGHThreat Intel

Cyberattack on Rostelecom - Major DDoS Disruption Reported

A significant DDoS attack on Rostelecom disrupted internet services across Russia, affecting banking and government platforms. Users faced major accessibility issues, highlighting vulnerabilities in critical infrastructure.

The Record·