Router Security for Home and Small Business Users: What to Do After the NSA and FBI Warning

April 17, 2026

Security , Recent News

Author: Beau Dickie, Chief Information Security Officer

If you use a home router for work, this warning matters to you.

The latest joint guidance from the FBI, NSA, and international partners says Russian GRU actors have been exploiting vulnerable small office and home office routers to manipulate DNS and DHCP settings, redirect traffic, and harvest passwords, authentication tokens, emails, and browsing data. This is not just an enterprise issue. It is a home-office issue, a remote-work issue, and a business-risk issue created by vulnerable SOHO devices at the edge of the network.

In MSP environments, I routinely see edge devices excluded from normal patch cycles, reviewed less often than laptops and servers, and treated more like utilities than security assets. That gap is exactly why this kind of warning deserves attention. The router may sit quietly in the background, but it can still become the doorway to much bigger problems. This is especially true when a home office or small branch network is being used to access company email, cloud platforms, and sensitive business data.

Quick Summary

What happened: Russian GRU actors exploited vulnerable SOHO routers, overwrote DHCP and DNS settings, and enabled adversary-in-the-middle attacks that could expose passwords, tokens, and other sensitive data.

Why it matters: A compromised home or small-office router can create business risk when it is used for remote work, cloud access, or business communications.

What to do today: Reboot the router as a simple first step, then verify support status, update firmware, review DNS and DHCP settings, change admin credentials, and disable unnecessary remote management.

Who This Applies To

This applies to small and midsize businesses, remote workers, home offices, small branch locations, and anyone using a home or SOHO router to reach business systems. It also applies to MSP clients and IT leaders trying to understand whether business risk may be entering through home networks or smaller unmanaged edge devices rather than through traditional enterprise appliances. The federal guidance specifically points organizations with telework users toward reviewing remote access practices and how sensitive data is being accessed outside the office.

What Happened

According to the April 7 public service announcement, Russian GRU actors, also known as APT28, exploited vulnerable routers by changing DHCP and DNS settings so devices behind those routers would use attacker-controlled DNS resolvers. Once that happened, the attackers could capture DNS lookups and return fraudulent DNS responses for selected services, including Microsoft Outlook Web Access. If a user clicked through a certificate warning, that opened the door to adversary-in-the-middle activity against traffic the user expected to be protected.

That matters because this is not just about internet connectivity. It is about trust. If the router has been compromised, the attacker may be able to influence the traffic before many downstream protections ever have a chance to work. The advisory says these operations enabled the theft of passwords, authentication tokens, emails, and browsing information that would normally be protected by SSL or TLS encryption.

Why This Matters for Businesses

When I talk about business risk here, I do not mean only large corporate edge appliances. I mean the risk businesses inherit when employees, executives, and hybrid teams use vulnerable home and small-office routers to access work systems. The home router is no longer separate from the security conversation if it is part of how your people do business.

That is one of the biggest mindset shifts I would encourage. Businesses often put real effort into securing laptops, identity platforms, email, and cloud apps. All of that matters. But if the edge device feeding those sessions is outdated, misconfigured, or exposed, you may have a blind spot sitting right in front of the rest of your security stack.

How To Tell If You May Be Affected

At a high level, start with a few practical questions.

  • Is your router still supported by the manufacturer, or is it end-of-life?
  • Is the firmware current?
  • Do the DNS and DHCP settings look correct?
  • Is remote management exposed to the internet when it does not need to be?
  • Are there unexpected DNS resolvers configured anywhere in the device?
  • Have there been unfamiliar changes to admin access or router settings?

The official guidance points users toward checking support status, applying firmware updates, changing default credentials, and disabling internet-exposed management interfaces when not needed. The UK NCSC advisory also emphasizes router exploitation that overwrites DHCP and DNS settings to redirect traffic through attacker-controlled servers.

What To Do Today

If you use a home router for work, take action now.

1. Reboot the router

A reboot is a simple immediate step. It is not the full fix, but it is an easy place to start while you move through the more important validation and remediation steps below.

2. Check whether the router is still supported

If the device is end-of-life or end-of-service, replace it. Unsupported edge devices create avoidable risk, especially when they are part of remote work or small-office operations.

3. Update firmware

Apply the latest available firmware from the manufacturer. The federal guidance is clear that unpatched and unsupported devices are a real part of this problem.

4. Change router admin credentials

If the router still uses default credentials, weak credentials, or old credentials that may have been reused elsewhere, change them immediately.

5. Review remote management exposure

If the management interface is exposed to the public internet and there is no clear reason for that, disable it. Remote administration should not be open by default.

6. Verify DNS and DHCP settings

Look closely at the router's DNS and DHCP configuration. If the device is pointing to unfamiliar DNS resolvers, that deserves immediate attention. The core of this activity involved manipulating those settings to redirect traffic.

7. Take certificate warnings seriously

Do not click through certificate errors casually. The advisory specifically warns that users who navigate through certificate warning pages may expose encrypted traffic to adversary-in-the-middle interception.

8. Lock down DNS at a high level

Once you have verified the correct DNS settings, keep them that way. The point is not to create a complicated project. It is to make sure your router is using expected resolvers, not attacker-controlled ones, and to reduce the chance of unnoticed DNS manipulation going forward.

What To Do If You Suspect Compromise

If you think the router may have been tampered with, move quickly.

Isolate the device if needed. Change the admin credentials. Update firmware. Review DNS and DHCP settings carefully. Disable unnecessary remote management. If the device is outdated, unsupported, or behaving in a way you do not trust, replace it. In some cases, a factory reset followed by a secure reconfiguration may be the safest path. The DOJ says legitimate users can restore desired settings through the router management page or by using a factory reset.

After that, rotate passwords and tokens for any services that may have been exposed, especially email and other business systems. Review logs where available. Contact your ISP, your internal IT team, or your MSP to validate the environment. The NSA and FBI also direct suspected victims to report activity through FBI field offices or IC3.

A Note on Affected Devices and Model Specificity

Some public reporting has pointed to TP-Link devices and CVE-2023-50224. The most careful way to say that is this: the activity has been associated with some legacy TP-Link models affected by CVE-2023-50224, and TP-Link's own update emphasizes that the impacted models are legacy end-of-service or end-of-life devices and that current public lists may not be exhaustive. That is an important distinction, because the broader lesson is not about one brand alone. It is about outdated SOHO routers that have fallen outside normal support and patching cycles.

A Note for Our Managed Clients

If Vector Choice manages your business firewall, router, or edge security environment, our team is actively monitoring for relevant activity and reviewing devices under our management. If you have questions about your business network, remote access setup, or exposure created by home networks used for work, reach out to our team directly.

For Everyone Else

If you are not currently a managed client, this is a good time for a router audit or edge-device review. That can include checking support status, validating DNS and remote management settings, identifying end-of-life hardware, and making sure home-office and small-office devices are not being overlooked simply because they are outside the main office. The quieter a problem can be, the more disciplined the review process needs to be.

Final Takeaway

A trusted network starts at the edge, not after it.

If your home router is used for work, do not treat it like background equipment. Reboot it, review it, confirm that it is still supported, and make sure it is securely configured. For businesses with remote workers or hybrid teams, router security should be part of the conversation now, because SOHO router exposure can become business exposure very quickly.

Citations:

National Security Agency. (2026, April 7). NSA supports FBI in highlighting Russian GRU threats against routers. https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/

Federal Bureau of Investigation, National Security Agency, & partner agencies. (2026, April 7). Russian GRU exploiting vulnerable routers to steal sensitive information (Alert No. I-260407-PSA) [Public service announcement]. https://media.defense.gov/2026/Apr/07/2003907743/-1/-1/0/I-260407-PSA.PDF

U.S. Department of Justice, Office of Public Affairs. (2026, April 7). Justice Department conducts court-authorized disruption of DNS hijacking network controlled by a Russian military intelligence unit. https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled