
The United Kingdom’s National Cyber Security Centre (NCSC), the cyber defense arm of Government Communications Headquarters (GCHQ), has issued a warning about a concerning wave of cyber activity targeting routers across the region. According to the agency, these devices have been actively manipulated by a sophisticated hacking group known as APT28. This group is widely believed to be state-sponsored and linked to Russian intelligence operations.
The attackers’ strategy is relatively straightforward yet highly effective. By infiltrating and gaining control over routers—devices that form the backbone of internet connectivity in homes and organizations—they are able to create a launchpad for broader cyber-attack campaigns. Once inside, the hackers can redirect traffic, interfere with communications, and even compromise critical infrastructure.
One of their key objectives includes taking control of Domain Name System (DNS) services, which act as the internet’s address book. By manipulating DNS settings, attackers can redirect users to malicious websites without their knowledge, enabling large-scale data harvesting and surveillance.
Beyond DNS hijacking, the group has also focused on extracting sensitive intelligence from compromised networks. This can include confidential organizational data, internal communications, and user credentials. Such access allows attackers not only to gather intelligence but also to expand their reach deeper into targeted systems, increasing the scale and impact of their operations.
The British government has formally attributed these activities to APT28, linking the group to Russia’s Main Intelligence Directorate, also known as the GRU. Over the years, APT28 has operated under several aliases, including Forest Blizzard, Fancy Bear, Strontium, and Sofacy. Despite the different names, cybersecurity experts recognize these as references to the same persistent and highly capable threat actor known for conducting cyber-espionage and influence operations worldwide.
Typically, campaigns carried out by groups like APT28 are designed to enable what is known as adversary-in-the-middle attacks (a variation of man-in-the-middle attacks). In these scenarios, attackers secretly intercept and potentially alter communications between two parties without their knowledge. This technique allows them to capture sensitive data such as login credentials, financial information, and private communications. In addition to monitoring web traffic, they may also target desktop applications, exploiting vulnerabilities to steal stored passwords and other valuable information.
The implications of such attacks are significant. Compromised routers can affect not just individual users but entire organizations, making them an attractive target for state-sponsored groups seeking strategic advantages. The NCSC has urged individuals and businesses to remain vigilant by updating router firmware, using strong administrative passwords, and monitoring network activity for unusual behavior.
This incident highlights the growing sophistication of cyber threats and underscores the importance of proactive cybersecurity measures in an increasingly interconnected world.
Join our LinkedIn group Information Security Community!
















