Threat IntelHIGH

FBI Disrupts GRU Router Hijacking Operation Amid Rising Threats

Featured image for FBI Disrupts GRU Router Hijacking Operation Amid Rising Threats
#APT28#Iranian hackers#ClickFix#PLCs#malware#GRU#cyber espionage#DNS hijacking#TP-Link routers#FBI#cybersecurity

Original Reporting

S1SentinelOne Labs·SentinelOne

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupAPT28
AliasesGRU Unit 26165
AttributionRussian Government
Target SectorsGovernment, Critical Infrastructure
Target RegionsUnited States
Active Since2024
Campaign NameOperation Masquerade
Primary TTPsDNS Hijacking, Credential Theft
Tools UsedCompromised Routers, AMOS Malware
MITRE ATT&CKT1071.001 - Application Layer Protocol
MotivationEspionage and Intelligence Gathering
🎯

The FBI found that a Russian group was secretly watching people through their home routers. They changed settings to steal passwords and other private information. Now, the FBI has fixed many of these routers to protect users.

Quick Summary

The FBI has disrupted a significant cyber espionage operation by the Russian GRU, targeting thousands of compromised TP-Link routers across the U.S. and stealing sensitive user data.

What Happened

This week, the FBI executed Operation Masquerade, a court-authorized initiative aimed at dismantling a DNS hijacking network operated by Russia’s GRU Unit 26165 (APT28). The operation revealed that APT28 had compromised thousands of TP-Link small office and home routers across more than 23 U.S. states. Since at least 2024, these actors exploited known vulnerabilities in the routers to alter DNS settings, redirecting user traffic through GRU-controlled servers. This allowed them to intercept sensitive information such as passwords, authentication tokens, and emails, primarily targeting individuals in government, military, and critical infrastructure sectors.

Who's Affected

The FBI's investigation suggests that over 5,000 consumer devices and more than 200 organizations have been impacted by APT28's malicious DNS infrastructure. Specific models of TP-Link routers, particularly the WR841N, have been highlighted as vulnerable, allowing attackers to gain unauthorized access through specially crafted HTTP GET requests.

What's at Risk

The compromised routers not only facilitated credential theft but also enabled the interception of secure communications, including those involving Microsoft 365 and other cloud services. The GRU's ability to manipulate DNS settings poses a significant risk, as it can lead to unauthorized access to sensitive data typically protected by SSL and TLS encryption.

Patch Status

Under court supervision, the FBI deployed a series of commands to reset the DNS configurations of the compromised routers, restoring legitimate settings provided by ISPs. The agency is collaborating with U.S. internet service providers to notify affected customers and ensure that users can revert any unauthorized changes.

Immediate Actions

To protect against similar attacks, users are advised to:

  1. Check their router's DHCP settings against their ISP's recommendations.
  2. Change default usernames and passwords to more secure options.
  3. Regularly update router firmware and disable remote management features.
  4. Consider using open-source firmware alternatives for enhanced security, if technically proficient.
  5. Report any suspicious activity or potential compromises to local FBI field offices.

This operation underscores the importance of securing home and small office routers, as they are increasingly becoming targets for espionage and cyber attacks.

🔍 How to Check If You're Affected

  1. 1.Monitor DNS settings for unauthorized changes.
  2. 2.Check for unusual traffic patterns originating from home routers.
  3. 3.Conduct regular security audits on network devices.

🏢 Impacted Sectors

GovernmentMilitaryCritical Infrastructure

Pro Insight

The operation highlights the critical need for robust security measures on consumer devices, especially as sophisticated threat actors like APT28 continue to exploit vulnerabilities in widely used technology.

🗓️ Story Timeline

Story broke by SentinelOne Labs
Covered by Malwarebytes Labs

Sources

Original Report

S1SentinelOne Labs· SentinelOne
Read Original

Also covered by

MAMalwarebytes Labs

Russian hacking group targets home and small office routers to spy on users

Read

Related Pings

HIGHThreat Intel

Iranian APT Targets 5,219 Exposed Rockwell PLCs Worldwide, Disruption Reported

Iranian-affiliated APT actors are targeting thousands of exposed Rockwell PLCs globally, leading to operational disruptions and financial losses across critical infrastructure sectors.

Cyber Security News·
HIGHThreat Intel

UK Exposes Russian Submarine Activity Near Undersea Cables

The UK has revealed Russian submarines' covert operations near undersea cables, raising alarms about potential sabotage. This activity threatens vital connectivity for the UK and beyond.

The Record·
HIGHThreat Intel

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

CSO Online·
HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC Media·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark Reading·
HIGHThreat Intel

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

CyberAv3ngers, an Iranian state-backed group, is targeting U.S. critical infrastructure, exposing over 5,200 devices to potential attacks. Immediate action is needed to bolster cybersecurity.

Tenable Blog·