NCSC issues alert over Russian hacker campaign targeting SOHO routers
The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
The National Cyber Security Centre (NCSC) has uncovered two new Russian-linked campaigns aimed at harvesting login credentials from personal web and email services.
The APT28 group, also known as Fancy Bear or Forest Blizzard, has exploited vulnerable internet routers to enable Domain Name System (DNS) hijacking - allowing it to intercept traffic and steal sensitive data including passwords and access tokens.
In an advisory on 7 April, the security agency said the activity appears to be opportunistic in nature, starting with a scattergun approach to reach large numbers of potential victims. Thereafter, threat actors then narrow in on targets of interest as the attack develops.
Attackers redirect traffic through DNS servers under their control, with the resulting malicious DNS resolutions enabling adversary in the middle (AitM) attacks that harvest passwords, OAuth tokens, and other credentials for web and email related services.
The NCSC said it believes APT28 is almost certainly the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Centre Military Intelligence Unit 26165.
This group is believed to have been behind an attack against the German parliament in 2015, which led to data theft and disrupted the email accounts of German members of parliament and the vice chancellor, as well as an attempted attack against the Organisation for the Prohibition of Chemical Weapons (OPCW) in 2018.
That particular attack was aimed at disrupting the independent analysis of chemicals weaponized by the GRU in the UK.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Microsoft issues separate alert
In a separate alert, Microsoft has issued a similar warning, saying that the group has been carrying out this activity since at least August 2025.
"By compromising edge devices that are upstream of larger targets, threat actors can take advantage of less closely monitored or managed assets to pivot into enterprise environments," it said.
"Microsoft Threat Intelligence has identified over 200 organizations and 5,000 consumer devices impacted by Forest Blizzard’s malicious DNS infrastructure."
SOHO routers targeted in campaign
The first cluster of activity identified by the NCSC saw the DHCP DNS server settings of compromised small office/home office (SOHO) routers modified to include IP addresses owned by the attackers.
These settings were subsequently inherited by downstream devices such as laptops and phones.
Lookups for domain names containing key terms associated with particular services - frequently email applications or login pages - would be resolved by the malicious DNS servers to further IP addresses controlled by the group.
DNS requests that don't match the actor’s targeting criteria would instead be resolved to the legitimate IP addresses for the services being requested.
The group would then attempt to conduct AitM attacks against both user browser sessions and desktop applications, aiming to harvest user account credentials.
In the second cluster of activity, some servers received DNS requests via compromised devices including models of MikroTik and TP-Link routers. The DNS requests were forwarded from these servers to other servers under the group's control, the NCSC noted.
This cluster of infrastructure was also involved in interactive operations against a small number of MikroTik routers, mostly located in Ukraine, and probably of intelligence value to the actor.
"This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors," said Paul Chichester, NCSC director of operations.
"We strongly encourage organizations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice."
The NCSC advises organizations to protect the management interfaces of their systems, keep devices, networks, and software up to date, set up a security monitoring capability, and add applications to an allowlist.
They should also deploy a host-based intrusion detection system and use multi-factor authentication (MFA).
FOLLOW US ON SOCIAL MEDIA
Follow ITPro on Google News and add us as a preferred source to keep tabs on all our latest news, analysis, views, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Marc Benioff thinks AI isn't quite ready to replace software engineersNews Claims of AI replacing software engineers aren't fully reflected in big tech hiring trends, according to Marc Benioff
-
More than half of enterprises are using out-of-date operating systemsNews Most organizations are failing to update device operating systems and apps, leaving them vulnerable to threats
-
US bans foreign-made routers over security risksNews FCC says routers can be approved for sale, but so far, none are
-
Cloudflare warns state-backed hackers are ‘weaponizing legitimate enterprise ecosystems’ as ‘living off the land’ attacks surgeNews Chinese, North Korean, and Russian-backed threat groups now favor longer-term compromises over brute force attacks
-
NCSC names and shames pro-Russia hacktivist group amid escalating DDoS attacks on UK public servicesNews Russia-linked hacktivists are increasingly trying to cause chaos for UK organizations
-
The NCSC touts honeypots and ‘cyber deception’ tactics as the key to combating hackers — but they could ‘lead to a false sense of security’News Trials to test the real-world effectiveness of cyber deception solutions have produced positive results so far
-
Thousands of ASUS routers are being hijacked in a state-sponsored cyber espionage campaignNews Researchers believe that Operation WrtHug is being carried out by Chinese state-sponsored hackers
-
Warning issued over critical flaws spotted in TP-Link routersNews Researchers have spotted a pair of flaws in TP-Link routers, including a variation of a previously patched vulnerability
-
Government urges large enterprises to shore up defenses as NCSC warns UK faces four 'nationally significant' cyber attacks every weekNews UK enterprises of all sizes face escalating cybersecurity threats, ministers have warned
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software
