Thousands of consumer routers hacked by Russia’s military



The Russian military is once again hacking home and small office routers in widespread operations that send unwitting users to sites that harvest passwords and credential tokens for use in espionage campaigns, researchers said Tuesday.

An estimated 18,000 to 40,000 consumer routers, mostly those made by MikroTik and TP-Link, located in 120 countries, were wrangled into infrastructure belonging to APT28, an advanced threat group that’s part of Russia’s military intelligence agency known as the GRU, researchers from Lumen Technologies’ Black Lotus Labs said. The threat group has operated for at least two decades and is behind dozens of high-profile hacks targeting governments worldwide. APT28 is also tracked under names including Pawn Storm, Sofacy Group, Sednit, Tsar Team, Forest Blizzard, and STRONTIUM.

Technical sophistication, tried-and-true techniques

A small number of routers were used as proxies to connect to a much larger number of other routers belonging to foreign ministries, law enforcement, and government agencies that APT28 wanted to spy on. The group then used its control of routers to change DNS lookups for select websites, including, Microsoft said, domains for the company’s 365 service.

“Known for blending cutting-edge tools such as the large language model (LLM) ‘LAMEHUG’ with proven, longstanding techniques, Forest Blizzard consistently evolves its tactics to stay ahead of defenders,” Black Lotus researchers wrote. “Their previous and current campaigns highlight both their technological sophistication and their willingness to revisit classic attack methods even after public exposure, underscoring the ongoing risk posed by this actor to organizations worldwide.”

To hijack the routers, the attackers exploited older models that hadn’t been patched against known security vulnerabilities. They then changed DNS settings for select domains and used the Dynamic Host Configuration Protocol to propagate them to router-connected workstations. When connected devices visited the selected domains, their connections were proxied through malicious servers before reaching their intended destination.



Source link

  • Related Posts

    AI Podcasters Really Want to Tell You How to Keep a Man Happy

    “It’s soft propaganda,” says Mandii B, cohost of the sex and lifestyle podcast Decisions, Decisions. The videos, and the rhetoric they spew, are trained on toxic gender tropes. “It subtly…

    Meta AI app climbs to No. 5 on the App Store after Muse Spark launch

    Meta’s AI app has seen a sizable jump in installs following Wednesday’s launch of the company’s newest AI model, Muse Spark — its first model release under Alexandr Wang, the…

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    You Missed

    Trump blasts MAGA influencers who have split with him over Iran

    Trump blasts MAGA influencers who have split with him over Iran

    AI Podcasters Really Want to Tell You How to Keep a Man Happy

    AI Podcasters Really Want to Tell You How to Keep a Man Happy

    Analysis-Crypto giant Kraken’s Fed payment account sparks concerns about risks

    Analysis-Crypto giant Kraken’s Fed payment account sparks concerns about risks

    Nuclear heat keeps people warm in many countries. Why not ours?

    Nuclear heat keeps people warm in many countries. Why not ours?

    Wealth of Nations’ Full Title

    Wealth of Nations’ Full Title

    Khloé Kardashian Fronts It’s a 10 Haircare Campaign, Rebrand

    Khloé Kardashian Fronts It’s a 10 Haircare Campaign, Rebrand