Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

0
Medium
Exploit
Published: Wed Apr 08 2026 (04/08/2026, 10:54:14 UTC)
Source: SecurityWeek

Description

The APT28 threat group exploited vulnerabilities in TP-Link and MikroTik routers to perform adversary-in-the-middle (AitM) attacks involving DNS hijacking. This espionage operation was disrupted by US authorities. The attack leveraged compromised routers to intercept and manipulate network traffic. No specific affected versions or patches are detailed in the available information. There is no indication of known exploits currently active in the wild. The overall severity of this threat is assessed as medium based on the described impact.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/08/2026, 11:05:55 UTC

Technical Analysis

APT28 conducted espionage operations by exploiting vulnerabilities in TP-Link and MikroTik routers, enabling adversary-in-the-middle attacks through DNS hijacking. This allowed interception and potential manipulation of network communications. The operation was disrupted by US authorities, but no detailed technical information about the exploited vulnerabilities or affected firmware versions is provided. No patch or remediation details are available in the source data.

Potential Impact

The exploitation enabled interception and manipulation of network traffic via compromised routers, potentially allowing espionage activities such as data interception or redirection of users to malicious sites. The disruption of the operation by US authorities mitigates ongoing risk. There is no evidence of widespread exploitation currently active.

Mitigation Recommendations

Patch status is not yet confirmed — check vendor advisories from TP-Link and MikroTik for current remediation guidance. Network defenders should verify router firmware versions and apply any available updates from the vendors. Monitoring for unusual DNS activity and router behavior is advisable until patches are confirmed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 69d6368b1cc7ad14da6116ba

Added to database: 4/8/2026, 11:05:47 AM

Last enriched: 4/8/2026, 11:05:55 AM

Last updated: 4/9/2026, 8:18:14 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses