Publish Date
16/04/2026
Categories
Blogs Hot Topic
The recent wave of APT28‑linked router compromises is more than another headline about nation‑state cyber activity. It’s a reminder that network edge devices (often the most neglected assets in a business) have become prime targets.
APT28, also known as Forest Blizzard or Fancy Bear, has intensified its global campaign targeting outdated small‑office and home‑office (SOHO) routers. The UK’s National Cyber Security Centre and Microsoft have confirmed the group is actively hijacking outdated SOHO routers, quietly rewriting DNS and DHCP settings so internet traffic is routed through attacker‑controlled servers. This enables highly effective adversary‑in‑the‑middle attacks that silently harvest passwords, OAuth tokens, and sensitive business communications.
When attackers can silently rewrite DNS, hijack authentication flows, and intercept cloud traffic without ever touching an endpoint, the conversation shifts from “patch your laptops” to “treat your router like a Tier‑1 security asset.”
For organisations taking security seriously, this means aligning network infrastructure to established frameworks rather than relying on ad‑hoc best efforts. Controls from CIS Benchmarks, NCSC’s CAF, NIST 800‑53, and ISO 27001 Annex A all emphasise hardened configurations, least‑privilege access, secure management interfaces, and continuous monitoring. Yet many businesses still run routers with:
These gaps are exactly what APT28 exploited.
A mature organisation validates its network posture through penetration testing, configuration audits, and vulnerability scanning that explicitly include routers, switches, and Wi‑Fi controllers – not just servers and laptops.
The real shift is operational. Businesses increasingly recognise that evergreen, centrally managed routers and Wi‑Fi deliver security outcomes that manual patching never will. With a Managed Service Provider (MSP), firmware updates, configuration drift control, secure baselines, and proactive monitoring happen continuously in the background. No waiting for someone to remember to log in. No hoping the device isn’t end‑of‑life. No blind spots.
In a world where state actors exploit the smallest misconfiguration, evergreen network infrastructure isn’t a luxury – it’s a resilience strategy. The router is no longer a commodity box in a cupboard. It’s the first line of defence, and it deserves to be treated and managed accordingly.
See what managed support looks like