FBI and NSA Remotely Reset Thousands of Routers to Combat Russian Cyberattacks
The FBI and NSA admit they’ve been quietly resetting thousands of home and small business routers across the US—because Russia has been hacking them for months. The agencies revealed the scope of the operation in a joint statement, warning that any device targeted for this court-ordered reset should be urgently replaced to avoid further risk, according to 9to5Mac.
The announcement is blunt: Russian attackers have been systematically compromising routers since at least 2024. The federal agencies obtained a court order granting them authority to remotely reset thousands of affected routers. They haven’t detailed exactly how those routers were identified or what tipped them off to the compromise.
The reset itself is not a fix. The FBI and NSA stress that any router they intervened on should be pulled from service and replaced—not merely rebooted or factory-reset by the user. The implication is clear: these devices can’t be trusted to remain secure after the intrusion.
How Russian Cyber Intrusions on Routers Threaten Home and Small Business Security
Russian hackers targeting routers isn’t just about disrupting internet access. Once inside a router, attackers can monitor network traffic, steal credentials, and potentially pivot deeper into home or business systems. That means everything from personal banking data to confidential business documents could be at risk.
The agencies’ warning makes it plain: a remote reset may stop the immediate threat, but it doesn't guarantee that the device is clean. There’s no assurance that malware or backdoors haven’t persisted or that the router’s firmware hasn’t been manipulated. That’s why the guidance isn’t to update or reboot, but to replace the hardware entirely.
For users, there’s little comfort in this ambiguity. The agencies haven’t published a list of affected models or ISPs. If your router was reset by the FBI, you may have noticed a sudden loss of connectivity or an unexpected return to factory settings. Anyone experiencing these symptoms since the start of 2024 should treat their router as compromised.
Next Steps for Router Owners: Replacement, Security Upgrades, and Monitoring
If there’s a chance your router was swept up in this dragnet, the best move is to replace it with a new device that receives security updates from the manufacturer. Install the latest firmware before connecting to the internet. Change default passwords, disable remote management features, and monitor your network for unfamiliar devices.
Neither the FBI nor NSA have released a public lookup tool for affected routers, leaving owners to piece together the clues. The agencies urge anyone who suspects their device was reset to act immediately—replacement, not repair, is the only recommended path.
What remains unclear is the full scale of the compromise and whether additional waves of resets will follow. The agencies have not revealed how many routers were targeted, how the Russian hackers gained access, or what vulnerabilities were exploited. There’s also no public commitment to notify every affected user directly.
Analysis: The U.S. government’s willingness to reach into private homes and offices—even with a court order—signals the severity of the threat. This is not a routine malware campaign. It’s a wake-up call for how vulnerable consumer and SMB networking hardware remains, especially when adversaries are willing to work at scale.
What to watch: Will the FBI and NSA provide more transparency or tools for users to check their devices? Will router manufacturers respond with better security practices? For now, anyone with unexplained router resets in the past year should treat this as a critical incident and move to new hardware without delay.
Impact Analysis
- The FBI and NSA have remotely reset thousands of routers in response to ongoing Russian cyberattacks, highlighting the scale of the threat.
- Users whose routers were targeted are urged to replace their devices entirely, as a remote reset does not guarantee security from persistent malware.
- Compromised routers can lead to stolen credentials, network monitoring, and deeper cyber intrusions, putting both personal and business data at risk.



