Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Russian Hackers Target Routers in Major DNS Hijacking Scheme

Russian Hackers Target Routers in Major DNS Hijacking Scheme

Posted on April 7, 2026 By CWS

Russian cyber actors, known as Forest Blizzard, have initiated a massive campaign targeting home and small-office routers, compromising DNS traffic to intercept encrypted data. This campaign has already affected over 200 organizations and 5,000 consumer devices.

Background on Forest Blizzard

Forest Blizzard, also identified as APT28 or Strontium, operates with support from the Russian government, aligning with their foreign policy and intelligence goals. According to Microsoft, this operation has been ongoing since at least August 2025. The group, including its sub-group Storm-2754, systematically targets vulnerable small office/home office (SOHO) routers, creating a covert intelligence network.

Microsoft’s threat analysis assures that their assets have remained uncompromised during these attacks.

Technical Aspects of the Attack

The attack commences with unauthorized access to poorly secured routers, where the default network settings are altered. Forest Blizzard replaces legitimate DNS settings with their own servers, redirecting DNS queries to their infrastructure. Devices connected to these compromised routers unknowingly send DNS requests to these malicious servers.

The group utilizes dnsmasq, a common DNS and DHCP utility in many routers, to intercept DNS queries. This allows them to monitor domain lookups without triggering typical network security alerts.

Advanced Attacks on Secure Connections

For high-priority targets, Forest Blizzard escalates to Adversary-in-the-Middle (AiTM) attacks on Transport Layer Security (TLS) connections. This involves redirecting DNS queries to actor-controlled resolvers, returning spoofed IP addresses to victims’ devices. A TLS connection is then initiated with a server using a fake certificate.

If the victim ignores security warnings about the certificate, the connection proceeds, allowing Forest Blizzard to intercept sensitive information such as emails and credentials. These attacks have been confirmed against Microsoft Outlook and government servers in several African countries.

The campaign impacts sectors like government, IT, telecommunications, and energy, reflecting typical Russian intelligence priorities. While the router-level compromise is widespread, the TLS AiTM component targets specific high-value organizations, showcasing a strategic approach.

Preventive Measures and Recommendations

Microsoft advises immediate actions to mitigate these threats:

  • Reboot and update router firmware to close known vulnerabilities.
  • Change default router credentials to strengthen security.
  • Check Windows DNS settings for unauthorized changes.
  • Ensure employees do not bypass TLS certificate warnings.
  • Use Microsoft Defender to detect DNS anomalies.
  • Segment remote traffic and enforce VPN usage to protect cloud credentials.

Organizations should consider unmanaged SOHO devices as potential attack vectors. Forest Blizzard’s activities highlight the necessity of robust cybersecurity practices for remote and hybrid work environments.

Stay informed with our daily cybersecurity updates on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:APT28, Cybersecurity, DNS hijacking, Forest Blizzard, Microsoft, router security, Russian hackers, SOHO devices, Strontium, TLS attacks

Post navigation

Previous Post: AI Cyberattacks Demand New Defense Strategies
Next Post: APT28 Targets SOHO Routers in Global DNS Hijacking

Related Posts

Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks Cyber Security News
AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware Cyber Security News
Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report Cyber Security News
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware Cyber Security News
Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Microsoft Edge Fixes Actively Exploited Chromium Vulnerability Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Model Uncovers 10,000 Critical Software Flaws
  • Critical Nginx Vulnerability Demands Immediate Patching
  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark