Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Russia’s Military Hacked Thousands of Routers

Image © Arstechnica
Researchers say a GRU-linked operation compromised thousands of home and small-office routers in 120 countries, hijacking DNS and harvesting credentials. The campaign underscores the ongoing use of compromised networking gear for espionage.

The Russian military-linked threat group APT28 has again targeted home and small-office routers, compromising an estimated 18,000 to 40,000 devices across 120 countries.

Black Lotus Labs of Lumen Technologies reported that most affected models were MikroTik and TP-Link devices that reached end-of-life and were not patched against known vulnerabilities. The routers were folded into infrastructure controlled by APT28, enabling the group to proxy traffic and hijack DNS lookups for select sites, including domains used by Microsoft 365.

The operation shows a mix of traditional and cutting-edge techniques, with a small number of compromised devices acting as proxies to reach a larger pool of routers tied to foreign ministries, law enforcement, and government agencies targeted by the group.

To hijack traffic, attackers exploited outdated firmware, altered DNS settings, and used DHCP to propagate the malicious configurations to connected workstations. When users visited the affected domains, their connections were routed through malicious servers, allowing the theft of credentials and tokens during authentication flows.

Researchers urge users to verify DNS settings, replace end-of-life routers with supported devices, and apply available patches. The findings highlight the ongoing risk posed by APT28 and similar groups to governments and critical infrastructure worldwide.

 

Arstechnica

Related News

FCC Accelerates Copper Network Retirement
Telco Phygital Push: AI-Driven Retail
Mediacom Expands Multi-Gig Service in Jefferson City
Truvista Marks 811 Callout for Safe Digging
Flagstaff PPP: A Broadband Model
OpenClaw Security Flaws Highlight Privilege Escalation Risk

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more