UK exposes Russian cyber unit hacking home routers to hijack internet traffic
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在100个字以内。不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。好的,首先我得通读一下这篇文章,了解主要内容。 文章主要讲的是英国安全官员警告说,与俄罗斯军事情报有关的黑客正在利用易受攻击的互联网路由器来劫持网络流量并进行间谍活动。这个活动被描述为广泛且持续的网络间谍活动。黑客主要针对小型办公室和家庭办公室的路由器,因为这些设备通常安全设置较弱或软件过时。 文章提到这些黑客修改路由器设置,将互联网流量重定向到他们控制的服务器。这个黑客组织被称为Fancy Bear、BlueDelta和APT28,被评估为“几乎肯定是”俄罗斯GRU军事情报局的第26165单位。去年,超过20个情报机构联合指责该组织试图入侵西方物流公司和技术公司。 英国还曾指责该组织对德国议会和禁止化学武器组织发动网络攻击。这次警告中提到他们利用TP-Link路由器模型的漏洞,并通过SNMP协议进入路由器,收集信息并进行DNS设置修改,从而实施中间人攻击,窃取敏感数据或重定向用户到欺诈网站。 NCSC建议组织加强管理界面的安全性,限制或禁用SNMP,并升级协议版本和应用安全更新。保罗·奇切斯特强调了设备弱点被国家支持的行为者利用的风险,并呼吁采取措施保护网络。 总的来说,文章主要讲述了俄罗斯支持的黑客利用路由器漏洞进行间谍活动的情况,并提供了相应的防御建议。 </think> 英国警告称,与俄罗斯军事情报相关的黑客正利用易受攻击的路由器劫持网络流量并进行间谍活动。这些黑客主要针对小型办公室和家庭办公室设备,通过弱安全设置或过时软件进入系统。他们修改路由器设置以重定向流量至自身控制的服务器,并窃取敏感数据或引导用户至欺诈网站。英国情报机构将该组织识别为俄罗斯GRU军事情报局的一部分,并建议加强设备安全措施以应对这一持续性网络间谍活动。 2026-4-7 14:16:2 Author: therecord.media(查看原文) 阅读量:16 收藏

British security officials warned Tuesday that hackers linked to Russian military intelligence have been exploiting vulnerable internet routers to hijack web traffic and spy on victims, in what authorities described as a broad and ongoing cyberespionage campaign.

Officials said the activity centers on compromising small office and home office routers and similar network devices exposed to the internet, often because of weak security settings or outdated software.

In a technical advisory, experts from the National Cyber Security Centre (NCSC) — part of signals intelligence agency GCHQ — said the hackers have been observed altering router settings to redirect internet traffic through servers under their own control.

The group, widely known as Fancy Bear, BlueDelta and APT28, has been assessed to “almost certainly” be Unit 26165 of Russia’s GRU military intelligence agency — the highest confidence rating used by British intelligence.

Last year, a joint cybersecurity advisory co-sealed by more than 20 intelligence agencies accused the hacking group of being behind attempted digital break-ins at multiple Western logistics providers and technology firms supporting Ukraine.

The United Kingdom previously blamed the group for cyberattacks against the German parliament in 2015 and for an attempted operation against the Organisation for the Prohibition of Chemical Weapons in 2018, linked to efforts to disrupt analysis of a nerve agent used in an attempted assassination on British soil.

The advisory on Tuesday said the group was exploiting a number of TP-Link router models, although no other devices were named. These models are widely sold to consumers and small businesses and are not typically deployed as standard equipment by major internet service providers.

According to the NCSC, APT28 gains access in part by exploiting devices that use the Simple Network Management Protocol (SNMP) with default or weak “community strings,” which act as passwords. Many devices still rely on SNMP version 2, which lacks encryption, allowing attackers to intercept credentials and issue malicious commands remotely.

Once inside a router, the hackers can gather information about connected devices and map networks to identify further targets. They then modify Domain Name System (DNS) settings — which translate website names into IP addresses — enabling what cybersecurity experts call “adversary-in-the-middle” attacks.

This allows attackers to intercept sensitive data, including login credentials and authentication tokens, or redirect users to fraudulent websites.

The advisory also highlighted the group’s use of known software vulnerabilities in network equipment to maintain access and expand their reach.

Officials said the campaign appears opportunistic at first, with attackers scanning widely for vulnerable devices before focusing on targets of intelligence interest.

The NCSC urged organizations to secure management interfaces, restrict or disable SNMP where not required, upgrade to more secure versions of the protocol and apply security updates.

Paul Chichester, the NCSC’s director of operations, said the activity shows how exploited weaknesses in widely used devices can be leveraged by state-backed actors.

“We strongly encourage organisations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice. The NCSC will continue to expose Russian malicious cyber activity and provide practical guidance to help protect UK networks,” he said.

The disclosure comes as Western officials continue to warn that Russian cyber units are conducting sustained espionage campaigns against governments, infrastructure and organizations linked to Ukraine and its allies.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and a fellow at the European Cyber Conflict Research Initiative, now Virtual Routes. He can be reached securely using Signal on: AlexanderMartin.79


文章来源: https://therecord.media/uk-exposes-russian-cyber-unit-hacking-home-routers
如有侵权请联系:admin#unsafe.sh