俄羅斯國家級駭客鎖定家用及 Soho 路由器
https://news.kagi.com/s/7xseb7

英國及業界研究人員於 4 月 7 日警告,與俄羅斯國家相關的組織 Fancy Bear(亦被追蹤為 APT28 和 Forest Blizzard)在一場長期的間諜活動中,一直在劫持易受攻擊的家用及小型辦公室路由器 。該活動集中在較舊、未修補漏洞的 MikroTik 和 TP-Link 設備,特別是已停止支援的型號,並讓攻擊者更改路由器設置,使受害者的網絡流量流經該組織控制的基礎設施 。
Russian state hackers target home and Soho routers

UK and industry researchers warned on April 7 that the Russian state-linked group Fancy Bear, also tracked as APT28 and Forest Blizzard, has been hijacking vulnerable home and small-office routers in a long-running espionage campaign. The activity centered on older, unpatched MikroTik and TP-Link devices, especially end-of-life models, and let the attackers change router settings so victims’ web traffic flowed through infrastructure the group controlled. According to the UK’s National Cyber Security Centre, Microsoft, and Black Lotus Labs, the operation cast a wide net to reach many potential victims before narrowing in on targets of intelligence interest. Researchers said the technique helped steal passwords and authentication tokens, including Microsoft Office tokens, without planting malware on victims’ computers, highlighting both the risks of aging network gear and the value of timely security updates. The encouraging part is that defenders have now exposed the campaign and laid out practical steps users can take, including replacing unsupported routers, installing the latest firmware, and reviewing DNS settings. Those steps can sharply limit the attackers’ room to operate.

Kagi News