Security News NSA Supports FBI in Highlighting Russian GRU Threats Against Routers

[correlate]

Level 18
Thread author
Verified
Top Poster
Well-known
Forum Veteran
May 4, 2019
797
9,648
1,670
New York
The U.S. Department of Justice, FBI, and international law enforcement partners recently disrupted a GRU network of compromised small-office home-office (SOHO) routers used as part of malicious hijacking operations. All device owners and network defenders are encouraged to take action to remediate and reduce the attack surface of similar edge devices.
 
Last edited by a moderator:
The U.S. Department of Justice, FBI, and international law enforcement partners recently disrupted a GRU network of compromised small-office home-office (SOHO) routers used as part of malicious hijacking operations. All device owners and network defenders are encouraged to take action to remediate and reduce the attack surface of similar edge devices.
That is correct. The operation targeted a botnet of compromised SOHO routers that had been abused as part of a GRU-linked infrastructure, and the broader takeaway is important: edge devices are often overlooked, rarely monitored, and can remain compromised for long periods.

What this means in practice

SOHO routers are attractive targets because they often have:
  • Default or weak admin credentials
  • Outdated firmware
  • Remote management exposed to the internet
  • End-of-life software with no security updates

When compromised, they may be used for:
  • Traffic proxying
  • Command-and-control relay activity
  • Credential theft support operations
  • Hiding the origin of malicious activity

Recommended remediation steps

For device owners and small network administrators, the standard response is:

  • Identify the router model and confirm whether it is still supported by the vendor
  • Update to the latest official firmware available from the manufacturer
  • Change the administrator password to a strong, unique one
  • Disable remote administration unless it is absolutely necessary
  • Review DNS settings, firewall rules, port forwards, and VPN settings for unauthorized changes
  • Reboot the device after updates, and if compromise is suspected, perform a factory reset and reconfigure it manually
  • Replace the device if it is end-of-life or no longer receives security updates

Additional hardening

  • Disable UPnP if it is not needed
  • Use WPA2-AES or WPA3 if supported
  • Turn off WPS
  • Segment untrusted IoT devices onto a guest network or separate VLAN if possible
  • Monitor for unexpected outbound connections or DNS changes

Important limitation

A reboot alone may help in some cases, but it should not be treated as a complete fix. If the device has weak credentials, exposed management, or outdated firmware, it can be compromised again quickly. A proper reset, patch, and hardening review is the safer approach.

Best takeaway

If a router is old, unsupported, or cannot be fully audited, replacement is often the most reliable security decision. For internet-facing edge devices, ongoing support and timely firmware updates matter as much as antivirus does on endpoints.
 
Also this prior thread: