Decoding the news. Western intelligence agencies have issued a rare joint cybersecurity warning over a large-scale espionage campaign attributed to APT28, the hacking group linked to Russia’s military intelligence agency, the GRU, accusing Moscow of exploiting vulnerable routers worldwide to infiltrate sensitive networks and steal strategic information.
- The alert — signed by the FBI, National Security Agency, Germany’s BfV and BND, Italy’s AISE and AISI, alongside cyber authorities from Canada, the Czech Republic, Denmark, Estonia, Finland, Latvia, Lithuania, Norway, Poland, Portugal, Romania, Slovakia and Ukraine — marks one of the broadest coordinated cyber advisories issued by Western allies in recent months.
Why it matters. According to officials, the Russian operation aimed to collect intelligence on government institutions, military assets and critical infrastructure, underscoring Moscow’s growing reliance on hybrid warfare capabilities beyond the conventional battlefield.
- The campaign further highlights how Russia continues to integrate cyber espionage into its broader geopolitical strategy, using digital operations to exert pressure on adversaries across NATO and Europe.
What happened. German authorities say APT28 compromised thousands of internet-exposed vulnerable TP-Link routers, transforming them into covert relay points for surveillance, data collection and traffic interception.
- Berlin confirmed that at least 30 vulnerable devices were identified in Germany, with several cases of confirmed Russian compromise.
- Germany’s domestic intelligence agency, the BfV, said it has been contacting affected operators since March 13, coordinating with regional authorities to raise awareness among network administrators and encourage the replacement or securing of compromised hardware.
- Officials stressed that many of the targeted devices were peripheral network appliances often overlooked in institutional and corporate cybersecurity planning, making them attractive entry points for hostile actors.
How the attack works. Western officials say the Russian hackers exploited known vulnerabilities in TP-Link devices, specifically CVE-2023-50224.
- Once access to the router is obtained, attackers alter DNS and DHCP configurations, replacing legitimate resolvers with servers controlled by Russian infrastructure.
- That enables hackers to monitor or manipulate all traffic generated by devices connected to the compromised network — including computers, smartphones, tablets and enterprise systems.
- The technique allows APT28 to position itself upstream of communications before data reaches its intended destination.
- This enables so-called “adversary-in-the-middle” attacks, where hostile actors secretly insert themselves between a victim and the digital service they are using while maintaining the appearance of normal operations.
- Through this method, attackers can intercept and manipulate sensitive data in transit, including passwords, authentication tokens, email credentials, encrypted communications, and confidential internal correspondence.
The actor behind the operation. APT28 — also known as Fancy Bear or Forest Blizzard — is one of the world’s most extensively tracked cyber threat actors.
- Western intelligence agencies have for years identified the group as an operational arm of the 85th Main Special Service Centre of the GRU, Russia’s military cyberwarfare unit.
- The group has been linked to some of the most significant cyber operations of the past decade, including: interference in the 2016 U.S. presidential election, attacks against NATO institutions, breaches targeting European defence ministries, operations against think tanks and international organisations.
Germany has been one of APT28’s most frequent targets. Berlin has contributed to the group:
- The 2015 Bundestag cyberattack, which forced the German parliament to rebuild its entire IT infrastructure.
- The 2023 compromise of SPD headquarters.
- The 2024 attack on Deutsche Flugsicherung, Germany’s national air traffic control authority.
The big picture. The warning reflects increasing concern among Western governments that Russian cyber operations are becoming more aggressive, scalable and structurally embedded in Moscow’s national security toolkit.
- It also signals heightened allied coordination in publicly attributing hostile cyber activity — a strategy designed to expose, deter and politically isolate state-backed threat actors operating in the grey zone between espionage and sabotage.



