Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
Overview
APT28, a Russian state-linked hacking group, has been exploiting vulnerabilities in MikroTik and TP-Link routers as part of a global cyber espionage campaign. Since at least May 2025, the group has targeted these routers to change their settings, effectively turning them into tools for malicious activities. This campaign raises significant concerns for users of these devices, as it can lead to unauthorized access to sensitive information and potential data breaches. The exploitation highlights the importance of securing home and small office routers, which are often overlooked in cybersecurity discussions. Users are urged to update their firmware and review their router settings to prevent unauthorized access.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: MikroTik routers, TP-Link routers
- Action Required: Users should update their router firmware to the latest version and review security settings to ensure they are configured correctly.
- Timeline: Ongoing since May 2025
Original Article Summary
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025. The large-scale exploitation campaign has been codenamed
Impact
MikroTik routers, TP-Link routers
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Ongoing since May 2025
Remediation
Users should update their router firmware to the latest version and review security settings to ensure they are configured correctly.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Update.