{"id":45197,"date":"2026-04-08T00:06:32","date_gmt":"2026-04-07T16:06:32","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins\/"},"modified":"2026-04-08T00:06:32","modified_gmt":"2026-04-07T16:06:32","slug":"authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/authorities-disrupt-router-dns-hijacks-used-to-steal-microsoft-365-logins\/","title":{"rendered":"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2026\/01\/29\/internet.jpg\" width=\"1600\" alt=\"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins\"><\/p>\n<p>An international operation from law enforcement authorities in partnership with private companies has disrupted FrostArmada, an APT28 campaign hijacking local traffic from MikroTik and TP-Link routers to steal Microsoft account credentials.<\/p>\n<p>The Russian threat group APT28, also tracked as Fancy Bear, Sofacy, Forest Blizzard, Strontium,&nbsp;Storm-2754, and Sednit, has been linked to Russia&#8217;s General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165.<\/p>\n<p>In the FrostArmada attacks, the hackers compromised mainly&nbsp;small office\/home office (SOHO) routers&nbsp;and altered the domain name system (DNS) settings to point to virtual private servers (VPS) under their control, which acted as DNS resolvers.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins\"><\/a> <\/div>\n<p>This allowed APT28 to intercept authentication traffic to targeted domains and steal Microsoft logins and OAuth tokens.<\/p>\n<p>At its peak in December 2025, FrostArmada infected 18,000 devices across 120 countries, primarily targeting government agencies, law enforcement, IT and hosting providers, and organizations operating their own servers.<\/p>\n<p>Microsoft, whose services were targeted by this campaign, worked together with Black Lotus Labs (BLL), Lumen&#8217;s threat research and operations division,&nbsp;to map the malicious activity and identify victims.<\/p>\n<p>With support from the FBI, the U.S. Department of Justice, and the Polish government, the offending infrastructure has been taken offline.<\/p>\n<h3>FrostArmada activity<\/h3>\n<p>The attackers targeted internet-exposed routers, primarily MikroTik and TP-Link, as well as some firewall products from Nethesis and older Fortinet models.<\/p>\n<p>Once compromised, the devices communicated with the attackers&rsquo; infrastructure and received DNS configuration changes that redirected traffic to malicious VPS nodes.<\/p>\n<p>The new DNS settings were automatically pushed to internal devices via the Dynamic Host Configuration Protocol (DHCP).<\/p>\n<p>When clients queried authentication-related domains the threat actor targeted, the DNS server returned the attacker&rsquo;s IP instead of the real one, redirecting victims to an adversary-in-the-middle (AitM) proxy.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"307\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/redirection.jpg\" width=\"800\" alt=\"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins\"><figcaption><strong>DNS request redirection at the router level<\/strong><br \/><em>Source: Black Lotus Labs<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The only visible sign of fraud for the victim would have been a&nbsp;warning for an invalid TLS certificate, which could have easily been dismissed. However, ignoring the alert gave the threat actor access to the victim&#8217;s&nbsp;unencrypted internet communication.<\/p>\n<p>&ldquo;The actor essentially ran a proxy service as the AitM that the end user was directed to via DNS,&rdquo; Lumen&#8217;s Black Lotus Labs researchers explain.<\/p>\n<p>&ldquo;The only sign of this attack would be a pop-up warning about connecting to an untrusted source because of the &#8216;break and inspect&#8217;&nbsp;configuration.&rdquo;<\/p>\n<p>&ldquo;If warnings were present and ignored or clicked through, the actor proxied requests to the legitimate services, collecting the data at the midpoint and collecting data associated with the targeted account by passing the valid OAuth token.&rdquo;<\/p>\n<p>In some cases, though, the hackers spoofed DNS responses for certain domains, thus forcing affected endpoints to connect to the attack infrastructures, Microsoft says in a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/07\/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a> today.<\/p>\n<p>Lumen reports that FrostArmada operated in two distinct clusters, one called the &#8216;Expansion team&#8217;&nbsp;dedicated to device compromise and botnet growth, and the second handling the AiTM and credential collection operations.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"462\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"763\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/April\/expansion.jpg\" alt=\"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins\"><figcaption><strong>Overview of the Expansion branch operations<\/strong><br \/><em>Source: Black Lotus Labs<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The researchers report that FrostArmada activity increased sharply following an August 2025 report from the National Cyber Security Centre (NCSC) in the UK describing a Forest Blizzard toolset that targeted Microsoft account credentials and tokens.<\/p>\n<p>Microsoft confirmed that APT28 carried out AitM attacks against domains associated with the Microsoft 365 service, as subdomains for Microsoft Outlook on the web have also been targeted.<\/p>\n<p>Additionally, the company observed this activity on servers belonging to three government organizations in Africa that were not hosted on Microsoft infrastructure. In those attacks, &#8220;Forest Blizzard intercepted DNS requests and conducted follow-on collection.&#8221;<\/p>\n<p>Black Lotus Labs also observed the threat actor targeting entities with on-premise email servers and &#8220;a small number of government organizations&#8221; in North Africa, Central America, and Southeast Asia.<\/p>\n<p>The researchers note that &#8220;there was also&nbsp;a connection to a national identity platform in one European country.&#8221;<\/p>\n<p>In a report today, the <a href=\"https:\/\/www.ncsc.gov.uk\/news\/apt28-exploit-routers-to-enable-dns-hijacking-operations\" target=\"_blank\" rel=\"nofollow noopener\">UK agency says<\/a> that the AitM activity impacted both browser sessions and desktop applications, and the DNS hijacking is believed to have been opportunistic in nature to build a large pool of potential targets and then filtering those of interest.<\/p>\n<p>Black Lotus Labs has published a small set of <a href=\"https:\/\/github.com\/blacklotuslabs\/IOCs\/blob\/main\/FrostArmada_IOCs.txt\" target=\"_blank\" rel=\"nofollow noopener\">indicators of compromise<\/a> for the VPS servers used during the FrostArmada campaign:<\/p>\n<table align=\"center\" cellspacing=\"0\" style=\"border-collapse:collapse; width:60%\">\n<thead>\n<tr style=\"background-color:#2c3e50; color:#ffffff\">\n<th style=\"padding: 10px; text-align: center; font-weight: bold; vertical-align: middle;\">IP address<\/th>\n<th style=\"padding: 10px; text-align: center; font-weight: bold; vertical-align: middle;\">First Seen<\/th>\n<th style=\"padding: 10px; text-align: center; font-weight: bold; vertical-align: middle;\">Last Seen<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"background-color:#f4f6f8\">\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">64.120.31[.]96<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">May 19, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">March 31, 2026<\/td>\n<\/tr>\n<tr>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">79.141.160[.]78<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">July 19, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">March 31, 2026<\/td>\n<\/tr>\n<tr style=\"background-color:#f4f6f8\">\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">23.106.120[.]119<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">July 19, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">March 31, 2026<\/td>\n<\/tr>\n<tr>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">79.141.173[.]211<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">July 19, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">March 31, 2026<\/td>\n<\/tr>\n<tr style=\"background-color:#f4f6f8\">\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">185.117.89[.]32<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">September 9, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">September 9, 2025<\/td>\n<\/tr>\n<tr>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">185.237.166[.]55<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">December 30, 2025<\/td>\n<td style=\"padding:10px; text-align:center; vertical-align:middle\">December 30, 2025<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The researchers note that defenders should&nbsp;implement certificate pinning for corporate devices (laptops, mobile phones) controlled via an MDM solution, which would generate an error when the attacker tries to intercept and analyze traffic on their VPS infrastructure.<\/p>\n<p>Another recommendation is to minimize the attack surface through patching, limiting exposure on the public web, and removing all end-of-life equipment.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/07\/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft<\/a> and the&nbsp;<a href=\"https:\/\/www.ncsc.gov.uk\/news\/apt28-exploit-routers-to-enable-dns-hijacking-operations#mitigation\" target=\"_blank\" rel=\"nofollow noopener\">NCSC<\/a> also provide a list of IoCs and protection guidance to help defenders identify and prevent DNS hijacking attacks.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/german-authorities-identify-revil-and-gangcrab-ransomware-bosses\/\">German authorities identify REvil and GandCrab ransomware bosses<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russia-arrests-suspected-owner-and-admin-of-leakbase-cybercrime-forum\/\">Russia arrests suspected owner of LeakBase cybercrime forum<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw\/\">TP-Link warns users to patch critical router auth bypass flaw<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-man-sentenced-for-operating-botnet-used-in-ransomware-attacks\/\">Manager of botnet used in ransomware attacks gets 2 years in prison<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/yanluowang-ransomware-access-broker-gets-81-months-in-prison\/\">Yanluowang ransomware access broker gets 81 months in prison<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>An international operation from law enforcement authori [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45197","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45197"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45197\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}