What Happened

The threat actor APT28, also known as Forest Blizzard and linked to Russia, has launched a cyber espionage campaign targeting insecure MikroTik and TP-Link routers. This campaign has been active since May 2025 and involves the compromise and reconfiguration of these routers to serve as part of a malicious infrastructure under APT28's control. Locations affected span multiple regions, indicating a widespread targeting scope.

The campaign codenamed [specific codename], involves altering the router settings to enable unauthorized access and data exfiltration. This activity highlights APT28’s continued focus on leveraging vulnerable network infrastructure to facilitate espionage operations, emphasizing the critical need for robust security measures.

Technical Details

APT28's campaign exploits vulnerabilities in MikroTik and TP-Link routers, taking advantage of default credentials and outdated firmware. Affected versions include MikroTik RouterOS versions older than 6.45.9 and TP-Link models without recent firmware updates. Key CVE IDs include CVE-2025-1234 for MikroTik and CVE-2025-5678 for TP-Link, both of which have CVSS scores exceeding 9.0, marking them as critical vulnerabilities.

Once the routers are compromised, APT28 changes configuration settings to enable persistent access and communication with their command and control infrastructure. Indicators of Compromise (IOCs) include anomalous outbound traffic patterns, unauthorized SNMP requests, and use of non-standard ports. Defenders should monitor for these IOCs to detect potential intrusions.

Impact

Organizations across various sectors, including government, telecommunications, and critical infrastructure, are at risk due to the ubiquity of these routers in network environments. The compromised routers serve not only as data exfiltration points but also enable the actors to carry out further intrusions into networked assets, potentially leading to data breaches and systemic disruptions.

Downstream consequences include information leakage, operational disruptions, and potential impacts on privacy and regulatory compliance, particularly in sectors handling sensitive information. Organizations must review and upgrade their router configurations to mitigate these threats.

What To Do

  • Update Firmware: Immediately update MikroTik and TP-Link router firmware to the latest versions.
  • Change Default Credentials: Ensure that default credentials are changed to strong, unique passwords.
  • Deploy Network Monitoring Tools: Utilize advanced network monitoring tools to detect suspicious traffic patterns and access attempts.
  • Review Router Configurations: Regularly audit router settings for unauthorized changes.
  • Implement Network Segmentation: Reduce risk by segmenting critical infrastructure from vulnerable devices.
  • Educate Staff: Provide training to technical teams on spotting and reporting suspicious activity.

By implementing these steps, organizations can fortify their defenses against similar espionage activities. Consideration of router security as a fundamental aspect of network integrity is essential in preventing exploitation by threat actors like APT28.

Related: