Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers
Traffic is being redirected through attacker-controlled servers.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
You are now subscribed
Your newsletter sign-up was successful
Update - Thursday, April 8, 12 pm ET: TP-Link has provided the following statement to Tom's Hardware: “TP-Link takes the threat of cyberattacks on network devices very seriously. TP-Link devices referenced in the reporting reached End of Service and Life (EOSL) status several years ago, the full list of models impacted can be found here https://www.tp-link.com/uk/support/faq/5058/. While these products are outside of our standard maintenance lifecycle, TP-Link has developed security updates for select legacy models where technically feasible. To ensure these updates take place, we recommend following the advice listed on the security advisory. We encourage customers using legacy or EOSL devices to upgrade to currently supported hardware that receives regular security updates. As immediate precautions, users should update to the latest available firmware, disable remote management, use strong and unique administrator passwords, and restrict device access to trusted internal networks only.”
The UK National Cyber Security Centre (NCSC) on Tuesday published an advisory warning that Russian state hacking group APT28 has been exploiting vulnerable small office and home office (SOHO) routers since 2024 to overwrite their DHCP and DNS settings, redirecting downstream traffic through attacker-controlled DNS servers to harvest passwords and authentication tokens for web and email services. The NCSC assesses that APT28 is "almost certainly" the Russian Main Intelligence Directorate (GRU)'s 85th Main Special Service Centre, Military Intelligence Unit 26165.
According to the advisory, the actor has been configuring virtual private servers to act as malicious DNS resolvers, then pointing compromised SOHO routers at them by rewriting the routers' DHCP DNS settings. Laptops, phones, and other downstream devices on the network inherit those settings automatically and begin sending lookups to the attacker-controlled infrastructure.
Lookups for domains tied to targeted services, such as login pages, get pointed to further attacker-owned IPs that host adversary-in-the-middle infrastructure. Meanwhile, requests outside the targeting criteria are resolved to the legitimate addresses to avoid breaking the connection.
Article continues belowOnce a victim connects through the attacker's infrastructure, APT28 attempts to capture passwords and OAuth or similar authentication tokens from both browser sessions and desktop applications. Targeted domains listed in the advisory include autodiscover-s.outlook.com, imap-mail.outlook.com, outlook.live.com, outlook.office.com, and outlook.office365.com.
The TP-Link WR841N router is named by the NCSC as one of the models APT28 has been exploiting, likely using CVE-2023-50224, an unauthenticated information disclosure flaw that allows an attacker to retrieve credentials through an HTTP GET request. When the threat actor has the router’s credentials, a second GET request rewrites the DHCP DNS settings, setting the primary DNS to a malicious IP and the secondary to the original primary.
The advisory lists more than 20 additional TP-Link models targeted in the campaign, including the Archer C5 and C7, the WDR3500, WDR3600, and WDR4300, the WR1043ND, the MR3420 and MR6400 LTE routers, and several variants of the WR740N, WR840N, WR841N, WR842N, WR845N, and WR941ND. A second cluster of attacker infrastructure received DNS requests forwarded from compromised MikroTik routers as well as TP-Link gear, and was also used in interactive operations against a smaller set of MikroTik routers "often located in Ukraine" that the NCSC said were likely of intelligence value.
The NCSC describes the campaign as opportunistic, with APT28 casting a wide net across exposed routers and then filtering the resulting victim pool for targets of intelligence interest at each stage. In terms of mitigation, the NCSC recommends the usual advice of keeping router firmware updated, never exposing management interfaces to the internet, and enabling multi-factor authentication on accounts that could be vulnerable to credential theft.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
APT28, also tracked as Fancy Bear, Forest Blizzard, and Sofacy, has previously been linked by the NCSC to the 2015 hack of the German Bundestag and the 2018 attempted intrusion at the Organisation for the Prohibition of Chemical Weapons.
Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Luke James is a freelance writer and journalist. Although his background is in legal, he has a personal interest in all things tech, especially hardware and microelectronics, and anything regulatory.
-
TechieTwo No surprise here... Pretty much all consumer grade routers are totally insecure. There are multiple sites that show how to protect yourself from the hackers.Reply -
Makaveli Reply
Nah I run an Asus router with Merlin firmware and its pretty good.TechieTwo said:No surprise here... Pretty much all consumer grade routers are totally insecure. There are multiple sites that show how to protect yourself from the hackers.
But ya I wouldn't touch anything that is TL-Link -
gggplaya Reply
Asus Routers run a customized version of OpenWRT. Because OpenWRT is opensource, Asus is required to publish their firmware, which is where Merlin picks it up and adds a few more OpenWRT libraries to it and tweaks the firmware. But essentially Asus Routers are based on opensource software which can be a double edged sword. Sure the hackers have access to the firmware, but so does the opensource community which can more heavily scrutinize the firmware, find vulnerabilities and create patches.Makaveli said:Nah I run an Asus router with Merlin firmware and its pretty good.
But ya I wouldn't touch anything that is TL-Link
I agree, I would personally never use a TP-Link router at home. I've dealt with their terrible firmware in the past. That was years ago, I guess they still aren't any better today. -
Thunder64 Reasons not to buy TP-Link:Reply
They want you to pay a subscription for certain features.
They are intentionally undercutting pricing in an effort to force others out of the market at which point there will attempt to corner the market.
This article. -
tech.kyle Misspelling of "MikroTik", which is not what I'd consider a normal consumer router.Reply
MikroTik usually expects you to know enough to harden your own network, although the defaults are decent. Improperly configured ones have been getting hacked for years, but it's not something I'd blame them for. -
nrdwka Unfortunately, cisco also is not immune for vulnerabilities. I'd choose openwrt based router over any non-open-source🤷♂️Reply -
tracker1 I'm sure banking these devices will help.. I mean why force mfg to actually maintain security updates when you can just shut down the business altogether and get people running more insecure devices... No risk there.Reply
I'll keep my OpnSense box and commercial AP all the same... -
Vanderlindemedia Kind of why i setup every device with a DNS of their own (Cloudflare, 1.1.1.1) - at least your assured your ISP is not selling your data out, or let alone EU restrictions on certain websites (i.e rt.com)Reply
A hack like that would be simply bypassed due to devices having their own DNS resolver. -
TechieTwo Unfortunately many Asus and other name brand routers/modems are also very insecure. Check some of the reputable router security websites for specifics. It's not my opinion but documented by several sources.Reply
Cisco which is almost exclusively Biz oriented hardware is some of the most insecure often hacked hardware on the planet - likely because hackers want to infiltrate businesses and Cisco has not done a great job on security in many cases. -
Dr3ams I have a Deutsche Telekom Speedport Smart 4 Router that is made by Arcadyan, based in Taiwan. All their security updates (including firmware) is done by Telekom automatically. While parts of the software are open source, the core router operating system is not. I've never had any problems with this router. Also, since I lease this router from Telekom, I always get the newest version when it's available.Reply