APT28 of Russia Hacks Home and Small Office Routers

Summary: APT28, a Russian military intelligence group, hacked between 18,000 and 40,000 home and small office routers across the globe to steal credentials.

APT28 and Home Routers: How Invisible Infrastructure Becomes a Global Espionage Weapon
Ars Technica has gathered an investigation revealing a large-scale operation attributed to APT28—also known as Fancy Bear or Sofacy—in which thousands of home and small office routers were compromised to steal credentials and facilitate espionage operations. The most striking fact is that between 18,000 and 40,000 devices were affected in at least 120 countries.
Unlike a isolated attack, the campaign demonstrates a well-known but increasingly effective strategy: turning consumer devices into hidden infrastructure. Popular brand routers such as MikroTik and TP-Link, often improperly configured or unupdated, are transformed into intermediate points from which attackers can intercept traffic, redirect connections, or launch new phases of the attack.
The value of this approach lies not only in accessing the devices but also in what it allows. A compromised router can act as an invisible proxy, facilitating credential harvesting, network activity tracking, and concealing the attacker's real infrastructure. From a defensive standpoint, this makes detection extremely difficult because the traffic may appear legitimate or come from normal geographic locations.
Additionally, this technique enables attackers to operate on a large scale at relatively low cost. Instead of relying on dedicated servers that can be identified and blocked, they use a distributed network of compromised devices that constantly change and are hard to trace. In essence, it's a botnet with a more strategic purpose than purely disruptive.
This type of operation also highlights a persistent problem: the security of network devices in home and small office environments. Unlike corporate systems, these devices rarely receive adequate maintenance, regular updates, or secure configurations. This makes them an ideal target for advanced actors.
The impact extends beyond individual users. In a remote work and cloud service access context, a compromised router can become an indirect entry point into enterprise networks. This breaks the traditional perimeter model and forces rethinking where the attack surface actually begins.
The operation attributed to APT28 fits within a broader pattern of cyber espionage, where the goal is not necessarily immediate damage but persistent access, information collection, and strategic positioning within target networks.
From a defensive standpoint, this scenario requires paying more attention to home environment security. Changing default credentials, updating firmware, disabling unnecessary remote access, and monitoring anomalous network behavior are basic but essential measures.
The conclusion is clear: routers are no longer just connectivity devices; they are critical security assets. And while they continue to be ignored, they will remain one of the most effective tools for large-scale espionage operations.

Key facts

  • APT28 hacked between 18,000 and 40,000 routers.
  • The routers were mainly from MikroTik and TP-Link.
  • The operation affected at least 120 countries.
  • APT28 uses advanced techniques alongside traditional methods to intercept credentials.

Why it matters

This hack represents a significant risk to global cybersecurity, as APT28 continues to use advanced techniques alongside traditional methods to steal sensitive information.