HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

APT28 Hijacks Home and Small Office Routers for Global Espionage Campaign

Russian state‑sponsored hackers have compromised thousands of SOHO routers, rewriting DNS settings to spy on users, harvest credentials, and intercept cloud traffic. The campaign affects government, critical‑infrastructure, and small‑business networks, underscoring the need for rigorous third‑party hardware risk controls.

LiveThreat™ Intelligence · 📅 April 09, 2026· 📰 malwarebytes.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
malwarebytes.com

Russian APT28 Hijacks Home and Small Office Routers for Global Espionage Campaign

What Happened — A Russian state‑sponsored group (APT28/Fancy Bear) compromised thousands of SOHO routers, notably TP‑Link models, by exploiting an unauthenticated firmware flaw. The attackers rewrote DNS settings, routing traffic through servers they control to harvest credentials, intercept Microsoft 365 traffic, and collect browsing data. Microsoft reports over 200 organizations and 5,000 consumer devices are already affected.

Why It Matters for TPRM

  • Router compromise creates a persistent, network‑level foothold that bypasses traditional endpoint security.
  • Credential theft and traffic interception can expose sensitive data of your partners, customers, and supply‑chain contacts.
  • The attack vector exploits weak default configurations, highlighting the need for rigorous hardware‑security vetting.

Who Is Affected — Government agencies, critical‑infrastructure operators, small‑business vendors, and individual consumers using vulnerable SOHO routers.

Recommended Actions

  • Inventory all third‑party networking equipment and verify firmware versions.
  • Enforce strong, unique router admin passwords and disable remote management.
  • Apply vendor patches immediately; replace unsupported models.
  • Monitor DNS traffic for anomalous redirection and implement DNS‑SEC where possible.

Technical Notes — The campaign leverages a CVE‑like vulnerability in TP‑Link WR841N (and related models) that allows unauthenticated HTTP GET requests to retrieve admin credentials and alter DNS settings. Attackers then use the hijacked DNS to conduct credential harvesting and man‑in‑the‑middle (MITM) interception of TLS‑protected traffic. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/04/russian-state-sponsored-hackers-hijack-home-and-small-office-routers-for-espionage

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.