Threat IntelHIGH

Russian GRU - Exploiting Vulnerable Routers to Steal Data, Operation Masquerade Disrupts Network

Featured image for Russian GRU - Exploiting Vulnerable Routers to Steal Data, Operation Masquerade Disrupts Network
#Russian GRU#cyber security advisory#vulnerable routers#DNS hijacking#SOHO routers#GRU#cybersecurity#routers#APT28#Operation Masquerade

Original Reporting

CCCanadian Cyber Centre News

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

High severity β€” significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupRussian GRU
Aliasesβ€”
AttributionConfirmed
Target SectorsMilitary, Government
Target RegionsGlobal
Active Sinceβ€”
Campaign NameSOHO Router Exploitation
Primary TTPsDNS Hijacking, Router Exploitation
Tools Usedβ€”
MITRE ATT&CKT1583.001 (Acquire Infrastructure)
MotivationEspionage
🎯

The Russian military has been using weak home routers to steal sensitive information. Recently, U.S. authorities stopped a big part of this operation, which involved changing how these routers work to protect users better. It's important for everyone to keep their routers updated and secure.

Quick Summary

The Russian GRU is exploiting vulnerable routers worldwide, prompting a joint advisory from cybersecurity agencies. Operation Masquerade has disrupted a significant DNS hijacking network operated by the GRU, affecting thousands of routers across the U.S.

What Happened

The Canadian Centre for Cyber Security (Cyber Centre) has joined forces with the United States’ Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other international partners to issue a cybersecurity advisory regarding the Russian General Staff Main Intelligence Directorate (GRU). This advisory highlights how the GRU has been exploiting vulnerable routers globally to intercept and steal sensitive military, government, and critical infrastructure information.

In a recent operation known as Operation Masquerade, U.S. authorities disrupted a DNS hijacking network run by the GRU's Unit 26165 (APT28). This operation revealed that the GRU had compromised thousands of TP-Link small office and home office routers across more than 23 U.S. states. Since at least 2024, APT28 has been exploiting known vulnerabilities in these devices to gain unauthorized access to router management interfaces and manipulate DNS settings, redirecting users to GRU-controlled servers.

Who's Affected

The compromised routers have been used to target sensitive data from government, military, and critical infrastructure sectors. The GRU's operations have specifically aimed at intercepting credentials and sensitive communications from users connected to these routers.

What Data Was Exposed

The GRU's DNS hijacking tactics allowed them to collect a range of sensitive information, including passwords, authentication tokens, emails, and other critical data from devices on the same networks as the compromised routers. By redirecting DNS queries, the GRU could insert their infrastructure into encrypted sessions, further enhancing their data collection capabilities.

What You Should Do

To mitigate the risks associated with these vulnerabilities, users of SOHO routers are strongly encouraged to take the following actions:

  • Upgrade any end-of-support devices.
  • Update firmware to the latest versions to patch known vulnerabilities.
  • Change default usernames and passwords to strengthen security.
  • Disable remote management interfaces from the Internet to reduce exposure.

Additionally, the FBI has developed and deployed commands to reset the DNS configurations of the compromised routers, restoring legitimate resolver settings and blocking the original unauthorized access paths. The bureau is collaborating with U.S. internet service providers to notify affected customers, ensuring they are aware of the risks and necessary actions to secure their devices.

Consult the full joint advisory for further guidance on protecting your network against these threats.

πŸ” How to Check If You're Affected

  1. 1.Monitor DNS traffic for anomalies
  2. 2.Check router configurations for unauthorized changes
  3. 3.Implement alerts for unusual access patterns

🏒 Impacted Sectors

GovernmentMilitaryCritical Infrastructure

Pro Insight

The disruption of the GRU's DNS hijacking network through Operation Masquerade highlights the ongoing threat posed by state-sponsored cyber actors. Organizations must prioritize securing their network devices to prevent similar attacks.

πŸ—“οΈ Story Timeline

Story broke by Canadian Cyber Centre News
Covered by SentinelOne Labs

Sources

Original Report

CCCanadian Cyber Centre News
Read Original

Also covered by

SESentinelOne Labs

The Good, the Bad and the Ugly in Cybersecurity – Week 15

Read

Related Pings

HIGHThreat Intel

Danii Shchukin - Europol Names Notorious Ransomware Leader

Danii Shchukin, a notorious ransomware leader, has been named on Europol's most-wanted list. His criminal activities have caused millions in damages. Authorities are intensifying efforts to capture him and his accomplice.

CSO OnlineΒ·
HIGHThreat Intel

UK Exposes Russian Submarine Activity Near Undersea Cables

The UK has revealed Russian submarines' covert operations near undersea cables, raising alarms about potential sabotage. This activity threatens vital connectivity for the UK and beyond.

The RecordΒ·
HIGHThreat Intel

CISOs Can Learn from Musk Oxen - Third-Party Risks Explained

CISOs can learn valuable lessons from musk oxen about managing third-party risks. Recent cyberattacks highlight the importance of collaborative strategies. By working together, organizations can enhance their security posture against vulnerabilities.

CSO OnlineΒ·
HIGHThreat Intel

Contagious Interview Campaign Expands - New Malicious Packages Found

The Contagious Interview campaign is growing, with new malicious packages targeting sensitive data. North Korean group UNC1069 is behind this expansion, raising alarms for users.

SC MediaΒ·
HIGHThreat Intel

Russia's Fancy Bear APT Continues Its Global Onslaught

Russia's Fancy Bear APT is on the attack again, targeting various organizations. Experts warn that patching and zero trust measures are essential. Stay vigilant to protect against these sophisticated threats.

Dark ReadingΒ·
HIGHThreat Intel

CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure

CyberAv3ngers, an Iranian state-backed group, is targeting U.S. critical infrastructure, exposing over 5,200 devices to potential attacks. Immediate action is needed to bolster cybersecurity.

Tenable BlogΒ·