Russia’s military intelligence service has been inside home and office routers across Europe and beyond for two years, stealing login credentials from anyone who connects to the compromised networks. The UK’s National Cyber Security Centre published a detailed advisory Monday confirming that APT28, assessed with high confidence to be Russia’s GRU 85th Main Special Service Centre, has compromised thousands of routers to conduct DNS hijacking operations that harvest passwords and authentication tokens.
The scale is significant. The NCSC identified two distinct clusters of malicious infrastructure each involving multiple Virtual Private Servers configured to operate as fake DNS resolvers. These servers have been receiving “high volumes of DNS requests” from compromised routers since at least 2024, according to the advisory. The FBI confirmed the campaign is ongoing and warned that Russian actors are actively exploiting TP-Link routers using CVE-2023-50224.
The Attack Method Is Deceptively Simple
APT28 exploits known vulnerabilities in Small Office/Home Office routers to modify their DHCP and DNS settings. Once inside a router, the attackers change its DNS server configuration to point to infrastructure they control. Every device that connects to the compromised network including laptops, smartphones and tablets inherit these poisoned DNS settings automatically.
When victims try to reach legitimate websites particularly Microsoft Outlook Web Access, the malicious DNS servers redirect them to convincing replica sites. Paul Chichester, NCSC Director of Operations described the tactic as leveraging “exploited vulnerabilities in widely used network devices” for sophisticated hostile operations. The attackers specifically target authentication flows to steal both passwords and OAuth tokens that grant persistent access to cloud services.
Microsoft confirmed that APT28 has conducted adversary-in-the-middle attacks against Microsoft 365 domains and observed the activity targeting government organisations in Africa that were not hosted on Microsoft infrastructure. The company’s Threat Intelligence team noted that “Forest Blizzard intercepted DNS requests and conducted follow-on collection” in these cases.
Router Manufacturers Are Not Keeping Up
The NCSC specifically named TP-Link routers as compromised in this campaign, particularly the WR841N model exploited via CVE-2023-50224. This vulnerability allows unauthenticated attackers to extract credentials through specially crafted HTTP requests, a flaw that should never have reached production. MikroTik devices also appear in the compromised infrastructure logs, though the specific vulnerabilities used against those models were not disclosed in the advisory.
TechCrunch reported that the campaign targeted “unpatched routers” using “previously disclosed vulnerabilities” which suggests this is not sophisticated zero-day exploitation but opportunistic attacks against devices that consumers and small businesses have failed to update. That makes the scale of compromise even more concerning as thousands of routers are falling to known, patchable flaws.
The Intelligence Operation Behind the Technical Attack
The NCSC assessed that these operations are opportunistic in nature. APT28 casts a wide net to compromise as many routers as possible, then filters the harvested credentials to identify targets of intelligence value. This approach allows Russia’s military intelligence to monitor a vast pool of potential targets before focusing resources on the most valuable accounts.
Black Lotus Labs, Lumen’s research arm, observed APT28 targeting “a small number of government organizations” in North Africa, Central America and Southeast Asia through this campaign. The geographic spread suggests this is not a targeted operation against specific entities but a global intelligence collection effort designed to identify and exploit high-value accounts as they surface in the harvested data.
What Router Owners Must Do This Week
Check your router’s DNS settings immediately. If your router is configured to use DNS servers you do not recognise, particularly IP addresses that are not your internet service provider’s standard resolvers, assume compromise. The FBI advises users to “upgrade end-of-support devices, update to latest firmware versions, change default usernames and passwords and disable remote management interfaces from the Internet.”
Any certificate warnings in web browsers or email applications should be treated as potential indicators of DNS hijacking. The NCSC and Microsoft have published technical indicators of compromise that network administrators can use to identify malicious DNS infrastructure, though these indicators will only catch the specific servers disclosed in this advisory.
For organizations with remote workers, this campaign underscores why corporate VPN access should never rely on the security of home networks. If employees are accessing corporate resources through compromised routers, their authentication tokens can be harvested regardless of endpoint security controls. The FBI specifically recommends that organizations review relevant policies regarding how employees access sensitive data in light of this campaign.
References
- NCSC Advisory: APT28 exploit routers to enable DNS hijacking operations
- FBI Internet Crime Complaint Center: Russian GRU Exploiting Vulnerable Routers
- Infosecurity Magazine: Russian APT28 Hackers Hijack Routers to Steal Credentials
- BleepingComputer: Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins
- TechCrunch: Russian government hackers broke into thousands of home routers
- The Register: Russia’s APT28 behind latest wave of router, DNS attacks
This post is also available in:
April 8, 2026