Russian State Hackers Hijack Wi-Fi Routers to Steal Passwords, GCHQ Warns
Russian Hackers Hijack Routers to Steal Passwords

Hackers associated with the Russian state have successfully compromised widely used Wi-Fi routers and are actively employing them to harvest sensitive data, according to a stark warning issued by GCHQ. The National Cyber Security Centre (NCSC), a key component of the UK's national intelligence service, has disclosed that the notorious hacking collective known as Fancy Bear is exploiting a specific vulnerability found in certain router models.

How the Router Hijacking Scheme Operates

By hijacking the Domain Name System (DNS) – the fundamental system that translates web addresses into numerical IP addresses – the group can surreptitiously divert unsuspecting users to expertly disguised malicious websites. Once on these fake sites, individuals are tricked into surrendering critical personal information, including passwords and login credentials.

This sophisticated attack means a user could land on a counterfeit version of a legitimate site like Microsoft Outlook without any awareness, inadvertently typing and handing over every keystroke directly to the waiting hackers. The implications are severe, as Fancy Bear gains the capability to intercept and monitor private conversations between two parties, allowing them not only to read messages but also to potentially alter their content maliciously.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Scope and Duration of the Cyber Threat

The NCSC has confirmed that this router hacking campaign enables such interception across both standard web browser sessions and desktop applications. Alarmingly, this malicious activity has been ongoing since 2024 and has continued into the current year. The centre emphasized that Fancy Bear is "casting a wide net" in an aggressive effort to capture as many victims as possible, indicating a broad and persistent threat to both individuals and organizations.

Paul Chichester, Director of Operations at the NCSC, stated: "This activity demonstrates how exploited vulnerabilities in widely used network devices can be leveraged by sophisticated hostile actors. We strongly encourage organisations and network defenders to familiarise themselves with the techniques described in the advisory and to follow the mitigation advice. The NCSC will continue to expose Russian malicious cyber activity and provide practical guidance to help protect UK networks."

Protective Measures Recommended by GCHQ

In response to this escalating threat, GCHQ has outlined several crucial steps that individuals and businesses should implement immediately to bolster their defenses:

  • Promptly update all systems and software to the latest versions to patch known vulnerabilities.
  • Implement two-factor authentication (2FA) wherever possible, moving beyond reliance on passwords alone.
  • Establish a host-based intrusion detection system to continuously monitor for signs of suspicious or unauthorized activity on the network.

The Notorious Fancy Bear Hacking Group

Fancy Bear, also identified by aliases such as APT28, Unit 26165, and Forest Blizzard, is widely linked to Russia's GRU state military intelligence agency. It stands as one of the Kremlin's most infamous and capable hacking squads, renowned for being both highly skilled and exceptionally well-funded.

This revelation follows the NCSC's exposure last year of a separate, extensive Russian cyber campaign that targeted a staggering array of assets involved in supporting Ukraine. That operation ensnared everything from international logistics firms and air traffic control systems to surveillance cameras positioned on the Ukrainian border, showcasing the vast scale and ambition of state-sponsored Russian cyber operations.

Pickt after-article banner — collaborative shopping lists app with family illustration