Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Halts Russian Espionage Using Hacked Routers and DNS Tricks

US Halts Russian Espionage Using Hacked Routers and DNS Tricks

Posted on April 8, 2026 By CWS

The United States has successfully disrupted a sophisticated network of compromised small office/home office (SOHO) routers, which was reportedly used by Russian operatives for espionage activities. The operation, revealed on Tuesday by the US Justice Department and the FBI, involved cyberattacks linked to the threat group known as APT28, also referred to as Forest Blizzard and Fancy Bear. This group is believed to operate under the direction of Russia’s military intelligence agency, the GRU.

Methods of the Espionage Operation

The cybercriminals exploited vulnerabilities in TP-Link and MikroTik routers, altering their DHCP and DNS configurations. This manipulation allowed them to reroute internet traffic from affected devices through their controlled infrastructure. By executing an adversary-in-the-middle (AitM) attack, they were able to intercept and collect data such as passwords, authentication tokens, emails, and browsing information from unsuspecting users.

However, the success of these attacks depended on users ignoring TLS certificate warnings, which were triggered by the attackers’ infrastructure. The FBI highlighted that the hackers leveraged a known security flaw, tracked as CVE-2023-50224, to take over TP-Link routers.

Impact and Technical Insights

Microsoft has attributed the cyber activities to Forest Blizzard and a subgroup known as Storm-2754. The company identified over 200 organizations and 5,000 consumer devices that were compromised. According to Microsoft, the attackers modified the default network settings of the routers to use DNS resolvers under their control. This malicious reconfiguration led to a significant number of devices directing their DNS requests to the attackers’ servers.

The dnsmasq utility, a legitimate tool commonly used in smaller networks, was reportedly used by the attackers for DNS resolution. This utility functions as a DNS forwarder and cache, as well as a DHCP server, which facilitates network services. In certain cases, DNS requests were transparently proxied by the attackers’ infrastructure, maintaining connections to legitimate services without interruption. However, targeted domains experienced spoofed DNS responses, forcing them to connect to attacker-controlled servers.

Broader Implications and Responses

Lumen Technologies, through its Black Lotus Labs, has been monitoring this campaign, codenamed FrostArmada, since its inception in August 2025. The campaign ramped up in December 2025, with over 18,000 unique IPs from more than 120 countries interacting with the attackers’ systems. Government agencies, including ministries of foreign affairs and law enforcement, were among the primary targets.

Collaborating with Microsoft and US authorities, Lumen Technologies played a crucial role in dismantling the infrastructure used in these attacks. The UK’s National Cyber Security Centre (NCSC) also issued an advisory, detailing various indicators of compromise and offering defensive strategies. The NCSC’s list included VPS banners, targeted router models, domains, and IP addresses linked to the attackers.

Earlier in 2024, the FBI had already disrupted a similar botnet network used by the same Russian threat group. This highlights the ongoing threat of sophisticated cyber espionage operations and underscores the importance of vigilance and robust cybersecurity measures.

For further details on related cybersecurity disruptions, you may explore cases like the international operations against the Aisuru and Kimwolf DDoS botnets, and the efforts to dismantle the RedVDS cybercrime service by Microsoft and law enforcement agencies.

Security Week News Tags:APT28, Cybersecurity, DNS hijacking, Fancy Bear, FBI, Forest Blizzard, GRU, hacked routers, Russian espionage, US Justice Department

Post navigation

Previous Post: Masjesu Botnet: Global Threat to IoT Devices
Next Post: Zero-Day Exploit Threatens Adobe Reader Users

Related Posts

Herd Security Secures M to Enhance AI Training Platform Herd Security Secures $3M to Enhance AI Training Platform Security Week News
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives Security Week News
Reclaim Security Secures M to Enhance Remediation Tech Reclaim Security Secures $20M to Enhance Remediation Tech Security Week News
Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates Webinar Today: Ransomware Defense That Meets Evolving Compliance Mandates Security Week News
Chrome Zero-Day Exploitation Linked to Hacking Team Spyware Chrome Zero-Day Exploitation Linked to Hacking Team Spyware Security Week News
Equixly Raises  Million for AI-Powered API Penetration Testing Equixly Raises $11 Million for AI-Powered API Penetration Testing Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Malware Sandbox Tools Enhancing Security in 2026
  • Advanced Tool Detects Persistence Malware on Multiple OS
  • Packagist Supply Chain Breach Targets Eight Packages
  • npm Enhances Security with 2FA and Install Controls
  • AI Model Uncovers 10,000 Critical Software Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Malware Sandbox Tools Enhancing Security in 2026
  • Advanced Tool Detects Persistence Malware on Multiple OS
  • Packagist Supply Chain Breach Targets Eight Packages
  • npm Enhances Security with 2FA and Install Controls
  • AI Model Uncovers 10,000 Critical Software Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark