Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Attacks on Ebola centres intensify in eastern DRC amid outbreak fears | News

    May 24, 2026

    Best Replacement Prescription Lenses Online in 2026 | New Lenses for Old Frames

    May 24, 2026

    Dead By Daylight Finally Adds The Slasher Everyone’s Been Waiting For

    May 24, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Thousands of consumer routers hacked by Russia’s military
    Thousands of consumer routers hacked by Russia’s military
    Tech Reviews

    Thousands of consumer routers hacked by Russia’s military

    gvfx00@gmail.comBy gvfx00@gmail.comApril 8, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    The Russian military is once again hacking home and small office routers in widespread operations that send unwitting users to sites that harvest passwords and credential tokens for use in espionage campaigns, researchers said Tuesday.

    An estimated 18,000 to 40,000 consumer routers, mostly those made by MikroTik and TP-Link, located in 120 countries, were wrangled into infrastructure belonging to APT28, an advanced threat group that’s part of Russia’s military intelligence agency known as the GRU, researchers from Lumen Technologies’ Black Lotus Labs said. The threat group has operated for at least two decades and is behind dozens of high-profile hacks targeting governments worldwide. APT28 is also tracked under names including Pawn Storm, Sofacy Group, Sednit, Tsar Team, Forest Blizzard, and STRONTIUM.

    Table of Contents

    Toggle
    • Technical sophistication, tried-and-true techniques
      • Related posts:
    • Today's NYT Mini Crossword Answers for Oct. 23
    • NASA overhauls Artemis program, delaying Moon landing to 2028
    • Today's NYT Mini Crossword Answers for March 7

    Technical sophistication, tried-and-true techniques

    A small number of routers were used as proxies to connect to a much larger number of other routers belonging to foreign ministries, law enforcement, and government agencies that APT28 wanted to spy on. The group then used its control of routers to change DNS lookups for select websites, including, Microsoft said, domains for the company’s 365 service.

    “Known for blending cutting-edge tools such as the large language model (LLM) ‘LAMEHUG’ with proven, longstanding techniques, Forest Blizzard consistently evolves its tactics to stay ahead of defenders,” Black Lotus researchers wrote. “Their previous and current campaigns highlight both their technological sophistication and their willingness to revisit classic attack methods even after public exposure, underscoring the ongoing risk posed by this actor to organizations worldwide.”

    To hijack the routers, the attackers exploited older models that hadn’t been patched against known security vulnerabilities. They then changed DNS settings for select domains and used the Dynamic Host Configuration Protocol to propagate them to router-connected workstations. When connected devices visited the selected domains, their connections were proxied through malicious servers before reaching their intended destination.

    Related posts:

    Today's NYT Mini Crossword Answers for Feb. 6

    US data centers use enough electricity to power upwards of 16 million homes annually – the statistic...

    Top Five Best Wi-Fi 7 Mesh Systems: 2026's Battle-Tested List

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow To Complete Call Of Duty's Lost Outpost Event And Earn All Rewards
    Next Article Run Qwen3.5 on an Old Laptop: A Lightweight Local Agentic AI Setup Guide
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Best Replacement Prescription Lenses Online in 2026 | New Lenses for Old Frames

    May 24, 2026
    Tech Reviews

    AMOS macOS malware spreads through simple terminal tricks while security vendors debate whether its threat is actually new

    May 24, 2026
    Tech Reviews

    The Best Travel Router Is Your Laptop

    May 23, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025164 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 2025102 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202583 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025164 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 2025102 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202583 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.