Russian hacking group targets home and small office routers to spy on users
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求是直接写文章描述,不需要特定的开头。首先,我得通读整篇文章,抓住主要内容。 文章主要讲的是俄罗斯军方关联的黑客组织APT28,他们通过篡改SOHO路由器的DNS设置来进行网络间谍活动。他们利用这些路由器的漏洞,获取用户的敏感信息,包括密码和浏览数据。微软和FBI都对此进行了披露,并提到了受影响的设备数量和型号。 接下来,文章还讨论了FCC禁止进口外国路由器的决定,并指出安全问题比国籍更重要。最后给出了用户保护自己的建议,比如更改默认密码、更新固件等。 现在我需要把这些要点浓缩到100字以内。首先提到APT28及其活动方式,然后说明影响范围和建议措施。要确保信息准确且简洁。 </think> 俄罗斯军方关联的黑客组织APT28通过篡改SOHO路由器DNS设置进行网络间谍活动,窃取用户敏感信息。微软和FBI披露其影响范围,并建议用户检查设备安全设置以防范攻击。 2026-4-8 13:31:25 Author: www.malwarebytes.com(查看原文) 阅读量:12 收藏

British security officials found that a group linked to the Russian military is spying on users of compromised Small Office/Home Office (SOHO) routers in a broad cyber espionage campaign. A Microsoft blog goes into the technical details of these attacks.

The group, which we’ll refer to as APT28, but is also known under names like Fancy Bear, BlueDelta, and Forest Blizzard, changes the DNS settings of compromised routers so their traffic is sent through servers under their control, which enables APT28 to spy on users.

The domain name system (DNS) is the way that internet domain names are located and translated into Internet Protocol (IP) addresses. Devices usually get network settings from routers using Dynamic Host Configuration Protocol (DHCP).

If an attacker can tamper with the router’s DNS settings, they can silently steer traffic through infrastructure they control, harvest login details, and in some cases position themselves between the user and the real service. This is why the campaign can support credential theft and even targeted interception of Microsoft 365 and other cloud traffic.

An FBI public service announcement says that APT28:

“…has harvested passwords, authentication tokens, and sensitive information including emails and web browsing information normally protected by secure socket layer (SSL) and transport layer security (TLS) encryption.”

The FBI says the group cast a wide net over US and globally, before narrowing down their victims to those with access to information related to military, government, and critical infrastructure.

The NCSC advisory singles out a single model of TP-Link (WR841N) with a known vulnerability that enables an unauthenticated attacker to obtain information such as usernames and passwords via specially crafted HTTP GET requests. This router model is widely sold to consumers and small businesses and not typically used as standard equipment by major internet service providers. The article also includes a long but not exhaustive list of other TP-Link router models targeted by APT28.

Microsoft Threat Intelligence says it has identified over 200 organizations and 5,000 consumer devices impacted by Forest Blizzard’s malicious DNS infrastructure.

The router ban debate

A few weeks ago, we commented on the FCC’s decision to effectively stop foreign-made routers from being imported unless their manufacturers obtain an exemption, due to what the FCC called an “unacceptable risk to the national security of the United States or the safety and security of United States persons.”

APT28’s actions show the kind of risk the FCC is trying to stop, but they also reinforce our point: while the debate over router bans and supply-chain restrictions often focuses on national origin, the bigger issue is whether the devices are secure in practice. If a router ships with weak defaults, poor update support, or a confusing setup process, it becomes a target regardless of where it was made. Attackers do not need perfection. They only need enough exposed devices to build a large, quiet infrastructure for spying and redirection.

What you can do

To check whether your settings are OK, we can only give general directions since they are sometimes very device-specific. But this method usually works:

How to check that your router’s DHCP settings match what your ISP intends:

  1. Check your current DHCP information on a device.
    On a PC or phone connected to your home network, open the network details and note the IP address, subnet mask, default gateway, and DNS servers your device is using.
  2. Log in to your router and find its WAN/Internet settings.
    In the router’s web interface, look at the “Status” or “Internet” page to see what address it has received from the ISP, and which DNS servers it is configured to use.
  3. Compare against what your ISP documents or tells you.
    Check your ISP’s support pages or contact support to confirm what they expect: whether your connection should use DHCP or PPPoE, what range your public IP should come from, and which DNS servers they normally provide. Large mismatches (for example, DNS servers in a different country or from an unknown organization) are a reason to investigate further.
  4. If you use custom DNS, document it.
    If you deliberately use alternative DNS (for example, a privacy or security resolver), write that down and periodically re‑check that your router and clients are still using the addresses you chose.

Other measures

If you can afford it and haven’t already, upgrade to Wi-Fi 7 to help future-proof your setup while current models are still in stores.

You should at least:

  • Change your router’s default usernames and passwords to something less easy to guess.
  • Check the vendor’s website for updates and confirm the EOL date and update to the latest firmware versions.
  • Disable remote management interfaces from the Internet where possible.
  • All users should carefully consider certificate warnings in web browsers and email clients because they indicate something is wrong with the secure connection and could mean you are not talking to the genuine site.

For technically confident users, replacing vendor firmware with open-source alternatives like OpenWrt or DD-WRT can extend a router’s secure lifespan. But this comes with risks, including voiding warranties or potentially bricking your device. You should only do this, or have it done, if you’re comfortable troubleshooting.

If a US citizen suspects they have been targeted or compromised by a Russian cyberintrusion, they are asked to report the activity to their local FBI field office or file a complaint with the IC3. Be sure to provide details about the affected router, including device type and DHCP configurations.


We don’t just report on privacy—we offer you the option to use it.

Privacy risks should never spread beyond a headline. Keep your online privacy yours by using Malwarebytes Privacy VPN.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/russian-state-sponsored-hackers-hijack-home-and-small-office-routers-for-espionage
如有侵权请联系:admin#unsafe.sh