Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Russian government hackers break into thousands of home routers and steal passwords

Chrome finally has a better way to deal with having too many tabs open

Russian state-affiliated APT28 exploits SOHO routers in global DNS hijacking campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian state-affiliated APT28 exploits SOHO routers in global DNS hijacking campaign
Identity

Russian state-affiliated APT28 exploits SOHO routers in global DNS hijacking campaign

By April 7, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The Russian-linked threat actor known as APT28 (also known as Forest Blizzard) is said to be involved in a new campaign to infiltrate and modify less secure MikroTik and TP-Link routers to take control of malicious infrastructure as part of a cyberespionage campaign since at least May 2025.

This large-scale exploitation campaign, codenamed FrostArmada by Lumen’s Black Lotus Labs, is described by Microsoft as an effort to exploit vulnerable home and small office (SOHO) Internet devices to hijack DNS traffic and enable passive collection of network data.

“Their method changed the DNS settings of compromised routers to hijack local network traffic and capture and exfiltrate authentication credentials,” Black Lotus Labs said in a report shared with The Hacker News.

“Once the targeted domain was claimed by a user, the attacker redirected the traffic to an attacker-in-the-middle (AitM) node, where these credentials were collected and exfiltrated. This approach enabled a nearly invisible attack that required no end-user interaction.”

As part of a joint operation with the U.S. Department of Justice, Federal Bureau of Investigation, and other international partners, infrastructure associated with the campaign was disrupted and taken offline.

This activity is assessed to have started on a limited scale in May 2025, followed by widespread router abuse and DNS redirection beginning in early August. At its peak in December 2025, over 18,000 unique IP addresses from over 120 countries were found communicating with the APT28 infrastructure.

These efforts primarily target government agencies such as the Ministry of Foreign Affairs, law enforcement agencies, and third-party email and cloud service providers in North Africa, Central America, Southeast Asia, and European countries.

In analyzing the campaign, the Microsoft Threat Intelligence team attributed this activity to APT28 and its subgroup tracked as Storm-2754. The tech giant announced that it has identified more than 200 organizations and more than 5,000 consumer devices affected by the threat actor’s malicious DNS infrastructure.

“For nation-state attackers like Forest Blizzard, DNS hijacking enables persistent, passive visibility and large-scale reconnaissance,” Redmond said. “By compromising edge devices upstream of large-scale targets, attackers can leverage assets that are less closely monitored or managed to gain entry into enterprise environments.”

DNS hijacking activity also facilitates AitM attacks, facilitating the theft of passwords, OAuth tokens, and other credentials for web and email-related services, putting organizations at risk for widespread compromise.

Microsoft added that this development marks the first time that a hostile group has been observed using DNS hijacking at scale to support AiTM for Transport Layer Security (TLS) connections after exploiting edge devices.

Broadly speaking, the attack chain involves APT28 gaining remote administrative access to a SOHO device and changing the default network configuration to use a DNS resolver under its control. The malicious reconfiguration causes the device to send a DNS request to an attacker-controlled server.

This allows DNS lookups for email applications or login pages to be resolved by a malicious DNS server. Threat actors then attempt to perform AitM attacks against these connections in order to steal user account credentials by tricking victims into connecting to malicious infrastructure.

Some of these domains are associated with Microsoft Outlook on the web. Microsoft said it also identified AitM activity targeting non-Microsoft hosted servers in at least three government agencies in Africa.

The UK’s National Cyber ​​Security Center (NCSC) said: “DNS hijacking operations are thought to be opportunistic in nature, with attackers gaining visibility into a large pool of potential target users and then attempting to filter users at each stage of the exploitation chain to triage victims likely to have intelligence value.”

APT28 is said to have exploited TP-Link WR841N routers for DNS poisoning operations by leveraging the authentication bypass vulnerability CVE-2023-50224 (CVSS score: 6.5). This vulnerability can be used to extract stored credentials via a specially crafted HTTP GET request.

A second cluster of servers was found to receive DNS requests through a compromised router and then forward them to a server owned by a remote attacker. This cluster was also assessed to be conducting interactive operations targeting a small number of MikroTik routers in Ukraine.

“Forest Blizzard’s DNS hijacking and AitM activity enabled attackers to conduct DNS harvesting against sensitive organizations around the world, consistent with the attackers’ long-standing mission to collect espionage against priority intelligence targets,” Microsoft said.

“Although we have only observed that Forest Blizzard uses DNS hijacking campaigns for intelligence gathering, attackers may use AiTM’s location for additional outcomes such as malware deployment or denial of service.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHumanity strengthens computing deals with Google and Broadcom as demand soars
Next Article Chrome finally has a better way to deal with having too many tabs open

Related Posts

Docker CVE-2026-34040 allows attackers to bypass authentication and gain host access

April 7, 2026

Over 1,000 exposed ComfyUI instances targeted by cryptomining botnet campaign

April 7, 2026

[Webinar] How to close the identity gap in 2026 before AI exploits enterprise risks

April 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Russian government hackers break into thousands of home routers and steal passwords

Chrome finally has a better way to deal with having too many tabs open

Russian state-affiliated APT28 exploits SOHO routers in global DNS hijacking campaign

Humanity strengthens computing deals with Google and Broadcom as demand soars

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.