By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Russian cyber spies targeting consumer, Soho routers | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Russian cyber spies targeting consumer, Soho routers | Computer Weekly
News

Russian cyber spies targeting consumer, Soho routers | Computer Weekly

News Room
Last updated: 2026/04/07 at 5:05 PM
News Room Published 7 April 2026
Share
Russian cyber spies targeting consumer, Soho routers | Computer Weekly
SHARE

The UK’s National Cyber Security Centre (NCSC) and Microsoft have exposed an extensive Domain Name System (DNS) hijacking campaign against vulnerable consumer and small and home office (Soho) broadband routers conducted by the Russian cyber intelligence services.

Orchestrated by APT28 or Forest Blizzard – more widely-known as Fancy Bear – the operations saw the threat actor alter the settings of compromised devices to reroute internet traffic through malicious servers they held.

In this way, Fancy Bear was able to steal data such as login credentials, passwords and access tokens from personal web and email services belonging to their victims in a so-called adversary-in-the-middle (AiTM) attack.

The NCSC said the campaign was likely opportunistic, with Fancy Bear having cast a wide net to ensnare as many victims as possible. By targeting insecure home and small office equipment, Fancy Bear took advantage of less closely-monitored or managed assets to pivot into larger enterprise environments or targets of interest to Russian intelligence.

Indeed, Microsoft said it had identified over 200 organisations and 5,000 consumer devices impacted since the campaign began in August 2025.

“This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors,” said NCSC operations director Paul Chichester.

“We strongly encourage organisations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice.

“The NCSC will continue to expose Russian malicious cyber activity and provide practical guidance to help protect UK networks,” he added.

Routers on trial

The exposure of Fancy Bear’s latest campaign comes amid a fierce debate on the other side of the Atlantic following the Federal Communications Commission’s (FCC’s) implementation of tight restrictions on routers built outside the US – which in effect means virtually every commercially available router.

The US’ decision was framed on the basis that such hardware poses an unacceptable risk to the country’s national security and that of its citizens and residents.

However it has been criticised on the basis that while it eases fears over the potential for other governments – such as China – to interfere with networking hardware produced in their factories, it does not address the fact that security vulnerabilities such as those exploited by Fancy Bear will still exist regardless of where they were manufactured.

Writing in Computer Weekly, Forescout vice president of security intelligence, Rik Ferguson, said routers present a highly attractive footholds for attackers because they sit at the network edge, generally face the public internet, and are easily overlooked once deployed.

“Many of the weaknesses we see come from familiar, measurable issues like outdated software components, slow patching cycles, weak credentials, exposed management interfaces and long lifespans that extend well beyond vendor support,” he said.

“In firmware analysis, we regularly see common components that are years behind current versions, carrying known vulnerabilities that attackers can and do exploit.”

Ferguson advised security teams to treat routers and similar network infrastructure as part of the active attack surface, which in practice means keeping accurate inventories, prioritising their lifecycle management, and enforcing firmware updates and patching.

To prevent attackers like Fancy Bear from scoring easy wins, security teams should also look to disable any internet-exposed management interfaces, enforce unique credentials, and apply network segmentation measures so that one compromised router does not necessarily enable wider access.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Deepfake Paradox: Why Blockchain Holds the Key to Digital Trust | HackerNoon The Deepfake Paradox: Why Blockchain Holds the Key to Digital Trust | HackerNoon
Next Article Apple Macs will run AI through external graphics Apple Macs will run AI through external graphics
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple quarterly figures: Records again, but storage crisis hits
Apple quarterly figures: Records again, but storage crisis hits
Software
Google TV with even more Gemini and Shorts
Google TV with even more Gemini and Shorts
Computing
autonomous 4K video surveillance assisted by AI
autonomous 4K video surveillance assisted by AI
Mobile
Accenture is rolling out Microsoft Copilot to all 743,000 employees
Accenture is rolling out Microsoft Copilot to all 743,000 employees
News

You Might also Like

Accenture is rolling out Microsoft Copilot to all 743,000 employees
News

Accenture is rolling out Microsoft Copilot to all 743,000 employees

1 Min Read
AI learns to walk: This is how physical AI is conquering the world
News

AI learns to walk: This is how physical AI is conquering the world

2 Min Read
The Germans are in AI fever
News

The Germans are in AI fever

1 Min Read
7 good reasons to use Vivaldi
News

7 good reasons to use Vivaldi

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?