{"id":45206,"date":"2026-04-08T09:34:33","date_gmt":"2026-04-08T01:34:33","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign\/"},"modified":"2026-04-08T09:34:33","modified_gmt":"2026-04-08T01:34:33","slug":"russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/08\/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign\/","title":{"rendered":"Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6xcrxyaKNQYXfVN-AHFfiSrJ_8SwW3v7MgKlJNBi-E5WIwT3ZNrNm4fcT0JZKHHLH9fbtMKdYhG_2DBHxkIy7-EydaWvEeeo4LDRPgAJ1K8i-YFeD9a0gPnw92xfN4FU3k7rQUhizsFLL8fiAo2YOw-ql-Ru07KtBUoA__B_fGYW4I6jnnn-OPwxoXnCx\/s1600\/router.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6xcrxyaKNQYXfVN-AHFfiSrJ_8SwW3v7MgKlJNBi-E5WIwT3ZNrNm4fcT0JZKHHLH9fbtMKdYhG_2DBHxkIy7-EydaWvEeeo4LDRPgAJ1K8i-YFeD9a0gPnw92xfN4FU3k7rQUhizsFLL8fiAo2YOw-ql-Ru07KtBUoA__B_fGYW4I6jnnn-OPwxoXnCx\/s1600\/router.jpg\" alt=\"Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign\" \/><\/a><\/div>\n<p>The Russia-linked threat actor known&nbsp;as <a href=\"https:\/\/thehackernews.com\/2026\/03\/apt28-uses-beardshell-and-covenant.html\">APT28<\/a> (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May&nbsp;2025.<\/p>\n<p>The large-scale exploitation campaign has&nbsp;been <a href=\"https:\/\/www.lumen.com\/blog-and-news\/en-us\/frostarmada-forest-blizzard-dns-hijacking\">codenamed<\/a>&nbsp;<strong>FrostArmada<\/strong> by Lumen&#8217;s Black Lotus Labs, with&nbsp;Microsoft <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/07\/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks\/\">describing<\/a> it as an effort to exploit vulnerable home and small office (SOHO) internet devices to hijack DNS traffic and enable passive collection of network&nbsp;data.<\/p>\n<p>&#8220;Their technique modified DNS settings on compromised routers to hijack local network traffic to capture and exfiltrate authentication credentials,&#8221; Black Lotus Labs said in a report shared with The Hacker&nbsp;News.<\/p>\n<p>&#8220;When targeted domains were requested by a user, the actor redirected traffic to an attacker-in-the-middle (AitM) node, where those credentials were harvested and exfiltrated. This&nbsp;approach enabled a nearly invisible attack that required no interaction from the end&nbsp;user.&#8221;<\/p>\n<p>The infrastructure associated with the campaign has been disrupted and taken offline as part of a joint operation in collaboration with the U.S. Department of Justice, Federal Bureau of Investigation, and other international&nbsp;partners.<\/p>\n<p>The activity is assessed to have commenced as far back as May 2025 in a limited capacity, followed by widespread router exploitation and DNS redirection commencing in early August. At its peak in December 2025, more than 18,000 unique IP addresses from no less than 120 countries were found communicating with APT28 infrastructure.<\/p>\n<p>These efforts primarily singled out government agencies, such as ministries of foreign affairs, law enforcement, and third-party email and cloud service providers across North African, Central American, Southeast Asian, and European countries.<\/p>\n<p>The Microsoft Threat Intelligence team, in its analysis of the campaign, attributed the activity to APT28 and its sub-group tracked as Storm-2754. The&nbsp;tech giant said it identified more than 200 organizations and 5,000 consumer devices impacted by the threat actor&#8217;s malicious DNS infrastructure.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>&#8220;For nation-state actors like Forest Blizzard, DNS hijacking enables persistent, passive visibility and reconnaissance at scale,&#8221; Redmond said. &#8220;By compromising edge devices that are upstream of larger targets, threat actors can take advantage of less closely monitored or managed assets to pivot into enterprise environments.&#8221;<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg9mOsouu7Q_KQw1WF3pVTTCpE0DS0MUvz9r4jdSFOODAG8hSJVxQd0lLFbvvMhM6mFy7hrS2Fgwm_m3kfpnLrNwvOckwmrpVCTtf2-s3SJGGJ3YPvbqq0S_p-mDyKMhyphenhyphenobg1BEQDz1QznE9-UFxsMQ1A5l1nqEDuPrOSu914Cg9YlmxMGlgjd_wv0DDJHW\/s1600\/ms-router.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"1401\" data-original-width=\"1982\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg9mOsouu7Q_KQw1WF3pVTTCpE0DS0MUvz9r4jdSFOODAG8hSJVxQd0lLFbvvMhM6mFy7hrS2Fgwm_m3kfpnLrNwvOckwmrpVCTtf2-s3SJGGJ3YPvbqq0S_p-mDyKMhyphenhyphenobg1BEQDz1QznE9-UFxsMQ1A5l1nqEDuPrOSu914Cg9YlmxMGlgjd_wv0DDJHW\/s1600\/ms-router.jpg\" alt=\"Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign\" \/><\/a><\/div>\n<p>The DNS hijacking activity has also facilitated AitM attacks that made it possible to facilitate the theft of passwords, OAuth tokens, and other credentials for web and email-related services, putting organizations at risk of broader compromise.<\/p>\n<p>The development marks the first time the adversarial collective has been observed using DNS hijacking at scale to support AiTM of Transport Layer Security (TLS) connections after exploiting edge devices, Microsoft&nbsp;added.&nbsp;<\/p>\n<p>At a high level, the attack chain involves APT28 gaining remote administrative access to SOHO devices and changing default network configurations to use DNS resolvers under its control. The&nbsp;malicious reconfiguration causes the devices to send their DNS requests to actor-controlled&nbsp;servers.<\/p>\n<p>This, in turn, causes DNS lookups for email applications or login pages to be resolved by the malicious DNS server. The&nbsp;threat actor then attempts to conduct AitM attacks against those connections to steal user account credentials by tricking the victims into connecting to malicious infrastructure.<\/p>\n<p>Some of these domains are associated with Microsoft Outlook on the web. Microsoft said it also identified AitM activity aimed at non-Microsoft hosted servers in at least three government organizations in&nbsp;Africa.<\/p>\n<p>&#8220;It is believed that the DNS hijacking operations are opportunistic in nature, with the actor gaining visibility of a large pool of candidate target users then filtering down users at each stage in the exploitation chain to triage for victims of likely intelligence value,&#8221; the U.K. National Cyber Security Centre&nbsp;(NCSC) <a href=\"https:\/\/www.ncsc.gov.uk\/news\/apt28-exploit-routers-to-enable-dns-hijacking-operations\">said<\/a>.<\/p>\n<p>APT28 is said to have exploited TP-Link WR841N routers for its DNS poisoning operations by likely taking advantage&nbsp;of <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2023-50224\">CVE-2023-50224<\/a> (CVSS score: 6.5), an authentication bypass vulnerability&nbsp;that could be&nbsp;used to extract stored credentials via specially crafted HTTP GET&nbsp;requests.<\/p>\n<p>A second cluster of servers&nbsp;has been&nbsp;found to receive DNS requests via compromised routers and subsequently forward them to remote actor-owned servers. This&nbsp;cluster is also&nbsp;assessed to have engaged in interactive operations targeting a small number of MikroTik routers located in&nbsp;Ukraine.<\/p>\n<p>&#8220;Forest Blizzard&#8217;s DNS hijacking and AitM activity allows the actor to conduct DNS collection on sensitive organizations worldwide and is consistent with the actor&#8217;s longstanding remit to collect espionage against priority intelligence targets,&#8221; Microsoft&nbsp;said.<\/p>\n<p>&#8220;Although we have only observed Forest Blizzard utilizing their DNS hijacking campaign for information collection, an attacker could use an AiTM position for additional outcomes, such as malware deployment or denial of&nbsp;service.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Russia-linked threat actor known&nbsp;as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May&nbsp;2025.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45206","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45206"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45206\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}