Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Most home routers are tucked away in a corner, ignored, and that’s exactly what the Russian military intelligence unit was counting on. The GRU group known as APT28, responsible for some of the most significant state-sponsored hacks of the past decade, spent years exploiting this negligence, making its way into thousands of home and small office routers across 23 US states and using the access to intercept traffic, steal credentials, and build a shadow network of compromised devices. A joint federal report released April 7 outlined the scope of the attack and the court-authorized operation that disrupted it. It also came with clear instructions: There are five steps every router owner should take immediately.
The attack targeted small office/home office routers, also known as SOHO routers, and was carried out by a unit of Russia’s military intelligence agency, the GRU. Government agencies are urging people to follow basic router hygiene steps, such as updating to the latest firmware and changing the default login credentials. Includes the UK’s National Cyber Security Centre A number of TP-Link routers specifically Targeted by hackers.
Although this news seems quite alarming, it’s worth keeping in mind that the attack specifically affected enterprise routers, and thus your home. Wi-Fi router Probably not in danger. However, some affected routers can be used as standard home routers, so it’s worth checking if your model was exploited in the attack.
“There’s a big trend for router exploits these days, and this applies to both consumer and enterprise or enterprise routers,” Daniel Dos Santos, vice president of research at cybersecurity firm Forescout, told CNET.
Press release from National Security Agency It notes that the attack randomly targeted a wide range of routers, with the aim of gathering information about “military, government and critical infrastructure.”
This attack is linked to threat actors within the Russian GRU — which include APT28, Fancy Bear, Forest Blizzard, and other names — and has been ongoing since at least 2024, according to the FBI.
This process is known as Domain Name System hijacking, in which DNS requests are intercepted by changing the default network configurations on SOHO routers, allowing actors to see user traffic unencrypted.
“For nation-state actors like Forest Blizzard, DNS hijacking enables persistent, passive visibility and reconnaissance at scale,” says one analyst. Microsoft Threat Intelligence Report On the attack.
Microsoft identified more than 200 enterprise and 5,000 consumer devices affected by the GRU attack.
The FBI announcement mentions one router in particular: TP-Link TL-WR841NWi-Fi 4 model was Originally released in 2007. The UK’s National Cyber Security Center lists 23 TP-Link models that have been targeted, but notes that this is likely not comprehensive.
Below is the list of affected devices:
A TP-Link Systems spokesperson told CNET in a statement that all affected models reached end-of-service and end-of-life status several years ago.
“Although these products are outside our standard maintenance lifecycle, TP‑Link has developed security updates for specific legacy models where technically feasible,” the spokesperson said.
TP-Link urges people with these older routers to upgrade to a newer device if possible. You can find a list of available security patches on his site Security consulting page Countering the last attack.
The NSA referred the organizations to a list Best practices for securing your home network. The most important thing you can do if you are using one of the affected devices is to upgrade your router as soon as possible. It may not have received firmware updates in years, which is like leaving the door to your network open.
“The longer we continue to do this, the greater the risks,” said Rick Ferguson, vice president of security intelligence at FourScout. “A router occupies a privileged position within any network. All of your connections and traffic should pass through this device.”
In addition to using a newer device that still receives security updates, there are some other steps you can take to secure your network: