{"id":45208,"date":"2026-04-08T09:35:10","date_gmt":"2026-04-08T01:35:10","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/russian-apt28-hackers-hijack-routers-to-steal-credentials-infosecurity-magazine\/"},"modified":"2026-04-08T09:35:10","modified_gmt":"2026-04-08T01:35:10","slug":"russian-apt28-hackers-hijack-routers-to-steal-credentials-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/russian-apt28-hackers-hijack-routers-to-steal-credentials-infosecurity-magazine\/","title":{"rendered":"Russian APT28 Hackers Hijack Routers to Steal Credentials &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Russian hacking group APT28 has been exploiting vulnerable internet routers to redirect traffic through attacker-controlled servers and steal credentials from targeted organizations, the UK government has warned.<\/p>\n<p>In <a href=\"https:\/\/www.ncsc.gov.uk\/news\/apt28-exploit-routers-to-enable-dns-hijacking-operations\" target=\"_blank\">a new advisory<\/a> published on April 7, the UK&rsquo;s National Cyber Security Centre (NCSC) said it detected two new malicious campaigns it attributed to <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/russia-apt28-notdoor-outlook\/\" target=\"_blank\">APT28<\/a>.<\/p>\n<p>Both campaigns are linked to a list of virtual private servers (VPS), which have been actively modified by APT28 since 2024 to operate as malicious domain name system (DNS) servers.<\/p>\n<p>&ldquo;These VPSs typically receive high volumes of DNS requests originating from routers that had been exploited by the actor likely utilising public vulnerabilities,&rdquo; the NCSC advisory noted.<\/p>\n<p>The NCSC assessed that the initial DNS hijacking operations are &ldquo;opportunistic in nature,&rdquo; meaning that the APT28 hackers likely use this method to first gain visibility of a large pool of candidates and then filter down users at each stage in the exploitation chain to triage for &ldquo;victims of likely intelligence value.&rdquo;<\/p>\n<p>The UK government associates APT28 &ldquo;almost certainly&rdquo; to the Russian General Staff Main Intelligence Directorate&rsquo;s (GRU) 85th Main Special Service Centre (GTsSS) Military Intelligence Unit 26165, is known under many other names, including <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/fancy-bear-exploits-office-flaw\/\" target=\"_blank\">Fancy Bear<\/a>, Forest Blizzard, Strontium, the Sednit Gang, and Sofacy.<\/p>\n<p>In <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/07\/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks\/\" target=\"_blank\">a separate report<\/a>, also published on April 7, Microsoft Threat Intelligence said APT28 and&nbsp;and its sub-group tracked as Storm-2754, started compromising VPS servers to exploit&nbsp;small office\/home office (SOHO) routers &quot;since at least August 2025.&quot;<\/p>\n<h2><strong>First Activity Cluster Targets TP-Link Routers<\/strong><\/h2>\n<p>In the first activity cluster identified by the British cybersecurity agency, the dynamic host configuration protocol (DHCP) DNS settings of compromised SOHO routers, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/vulnerabilities-tplink-vpn-routers\/\" target=\"_blank\">mostly TP-Link routers<\/a>, were modified to include actor-owned IP addresses.<\/p>\n<p>One of the router models appearing in this campaign, the TP-Link WR841N, was likely exploited using CVE-2023-50224, a vulnerability that enables an unauthenticated attacker to obtain information such as password credentials via specially crafted HTTP GET requests.<\/p>\n<p>These settings were subsequently inherited by downstream devices, for example laptops and phones, leading requests matching APT28&rsquo;s targeting criteria to be resolved by the malicious DNS servers to IP addresses owned by the threat actor.<\/p>\n<p>The APT28 hackers would then attempt to conduct <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/phishing-targets-tiktok-for\/\" target=\"_blank\">adversary-in-the-middle (AitM) attacks<\/a> against follow-on connections, including user browser sessions and desktop applications, likely to harvest passwords, OAuth tokens and other credentials for web and email related services.<\/p>\n<p>&ldquo;Subsequent malicious logins using this stolen data may originate from further infrastructure not listed in this advisory,&rdquo; the UK agency noted.<\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/assets.infosecurity-magazine.com\/content\/span\/8abe1a5f-da80-47e6-b359-a7ddd15cdea2.png\" alt=\"Russian APT28 Hackers Hijack Routers to Steal Credentials - Infosecurity Magazine\" \/><figcaption>DNS hijacking through router compromise. Source: Microsoft Threat Intelligence<\/figcaption><p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-fcc-bans-foreign-made-routers\/\" target=\"_blank\"><em>Read more: US &ndash; FCC Bans Foreign-Made Routers Over National Security Concerns<\/em><\/a><\/p>\n<h2><strong>Second Activity Cluster Targets MikroTik and TP-Link Routers<\/strong><\/h2>\n<p>In a second activity cluster, the NCSC observed a subset of servers receiving DNS requests via likely compromised devices including models of MikroTik and TP-Link routers.<\/p>\n<p>In this campaign, the DNS requests were forwarded from these servers to further remote actor-owned servers.<\/p>\n<p>This cluster of infrastructure was also involved in interactive operations against a small number of MikroTik routers, often located in Ukraine, that were likely of intelligence value to the actor.<\/p>\n<h2><strong>NCSC Recommendations to Stop APT28&rsquo;s Credential Theft<\/strong><\/h2>\n<p>The NCSC provided a list of mitigation measures that could help in defending against the activity described in&nbsp;<a href=\"https:\/\/www.ncsc.gov.uk\/sites\/default\/files\/2026-04\/NCSC_APT28-exploit-routers-to-enable-DNS-hijacking-operations.pdf\">the advisory<\/a>. These include:<\/p>\n<ul>\n<li>Using browse-down architecture to prevent attackers easily gaining privileged access to your most vital assets<\/li>\n<li>Using the latest supported versions, applying security updates promptly, deploying antivirus and regularly scanning to detect known malware threats<\/li>\n<\/ul>\n<ul>\n<li>Adding applications to an allowlist<\/li>\n<li>Deploying a host-based intrusion detection system<\/li>\n<li>Using multifactor authentication (MFA)<\/li>\n<\/ul>\n<p>The NCSC has previously attributed activity to APT28, including the&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/german-mps-hit-russianbacked\/\" target=\"_blank\">2015 cyber-attacks against the German parliament<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/investigation-uncovers-300\/\" target=\"_blank\">an attempted attack against the Organisation for the Prohibition of Chemical Weapons<\/a>&nbsp;(OPCW) in April 2018.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russian hacking group APT28 has been exploiting vulnera [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45208","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45208"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45208\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}