radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

sourceThe Hacker News
calendar_todayApril 7, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

Summary

The article discusses a cyber espionage campaign by the Russian state-linked group APT28, targeting MikroTik and TP-Link routers. The campaign involves modifying router settings to facilitate DNS hijacking, turning these devices into malicious infrastructure.

Key Points

  • APT28, also known as Forest Blizzard, is linked to the Russian state.
  • The campaign targets insecure MikroTik and TP-Link routers.
  • Router settings are modified to enable DNS hijacking.
  • The campaign has been active since at least May 2025.
  • The exploitation is part of a broader cyber espionage effort.

Analysis

The significance of this campaign lies in its potential impact on global internet infrastructure, as compromised routers can be used to redirect traffic and intercept sensitive information. The involvement of a state-linked actor like APT28 underscores the geopolitical dimensions of cybersecurity threats, emphasizing the need for robust security measures for SOHO routers.

Conclusion

IT professionals should prioritize securing SOHO routers by applying the latest firmware updates and implementing strong authentication measures to prevent unauthorized access and mitigate the risks of DNS hijacking.