Download our ungated guide to high-quality penetration testing.

In 2025, state-aligned threat actors have increasingly shifted their focus toward internet-edge infrastructure — particularly routers and VPN appliances — as durable platforms for long-term persistence. Rather than relying solely on traditional endpoint compromise, these actors are exploiting legacy networking gear to gain strategic, persistent access with minimal visibility.
Two recent campaigns highlight this evolution:
These operations typically rely on tools already present in the firmware, such as embedded web servers or system binaries. Tactics include disabling logging, exfiltrating NetFlow data for reconnaissance, and evading traditional endpoint defenses by operating exclusively within networking layers.
Government alerts from U.S. and allied cybersecurity agencies have reinforced the urgency of this threat. They emphasize that many of these campaigns exploit known vulnerabilities in widely deployed devices — particularly in sectors like telecommunications, manufacturing and education.
If you have any questions about these threats or the steps you can take to mitigate them, please feel free to reach out to us at hello@networksgroup.com.
CISA/FBI Advisory on Legacy Network Device Exploits
Cisco Talos: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices
Dragos Year in Review 2025 – OT Threats
Recorded Future: RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers
Published By: Daniel Parker, VP of Ethical Hacking, NetWorks Group
Publish Date: November 18, 2025
Security news, tips, webinars, and more straight to your inbox.