Threat Advisories:
🎧 Podcast: This Month's Threats in 10 Min! Emerging Threat Intel Audio Briefing - Listen & Defend Now →
👥 Play Count: Loading...

Cybercriminals Forge Alliances via Compromised Routers

Threat Level – Red | Vulnerability Report
Download PDF

APT28 threat actors utilized compromised EdgeRouters to execute covert cyber operations, repurposing Ubiquiti EdgeRouter routers for a range of nefarious activities. With root access to compromised Ubiquiti EdgeRouters, they possess unrestricted control over Linux-based operating systems, allowing for the installation of tools and the concealment of their identities during malicious campaigns.

Threat Level – Red | Attack Report

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox