Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Russian Hackers Target Routers in Major DNS Hijacking Scheme

Russian Hackers Target Routers in Major DNS Hijacking Scheme

Posted on April 7, 2026 By CWS

Russian cyber actors, known as Forest Blizzard, have initiated a massive campaign targeting home and small-office routers, compromising DNS traffic to intercept encrypted data. This campaign has already affected over 200 organizations and 5,000 consumer devices.

Background on Forest Blizzard

Forest Blizzard, also identified as APT28 or Strontium, operates with support from the Russian government, aligning with their foreign policy and intelligence goals. According to Microsoft, this operation has been ongoing since at least August 2025. The group, including its sub-group Storm-2754, systematically targets vulnerable small office/home office (SOHO) routers, creating a covert intelligence network.

Microsoft’s threat analysis assures that their assets have remained uncompromised during these attacks.

Technical Aspects of the Attack

The attack commences with unauthorized access to poorly secured routers, where the default network settings are altered. Forest Blizzard replaces legitimate DNS settings with their own servers, redirecting DNS queries to their infrastructure. Devices connected to these compromised routers unknowingly send DNS requests to these malicious servers.

The group utilizes dnsmasq, a common DNS and DHCP utility in many routers, to intercept DNS queries. This allows them to monitor domain lookups without triggering typical network security alerts.

Advanced Attacks on Secure Connections

For high-priority targets, Forest Blizzard escalates to Adversary-in-the-Middle (AiTM) attacks on Transport Layer Security (TLS) connections. This involves redirecting DNS queries to actor-controlled resolvers, returning spoofed IP addresses to victims’ devices. A TLS connection is then initiated with a server using a fake certificate.

If the victim ignores security warnings about the certificate, the connection proceeds, allowing Forest Blizzard to intercept sensitive information such as emails and credentials. These attacks have been confirmed against Microsoft Outlook and government servers in several African countries.

The campaign impacts sectors like government, IT, telecommunications, and energy, reflecting typical Russian intelligence priorities. While the router-level compromise is widespread, the TLS AiTM component targets specific high-value organizations, showcasing a strategic approach.

Preventive Measures and Recommendations

Microsoft advises immediate actions to mitigate these threats:

  • Reboot and update router firmware to close known vulnerabilities.
  • Change default router credentials to strengthen security.
  • Check Windows DNS settings for unauthorized changes.
  • Ensure employees do not bypass TLS certificate warnings.
  • Use Microsoft Defender to detect DNS anomalies.
  • Segment remote traffic and enforce VPN usage to protect cloud credentials.

Organizations should consider unmanaged SOHO devices as potential attack vectors. Forest Blizzard’s activities highlight the necessity of robust cybersecurity practices for remote and hybrid work environments.

Stay informed with our daily cybersecurity updates on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:APT28, Cybersecurity, DNS hijacking, Forest Blizzard, Microsoft, router security, Russian hackers, SOHO devices, Strontium, TLS attacks

Post navigation

Previous Post: AI Cyberattacks Demand New Defense Strategies
Next Post: APT28 Targets SOHO Routers in Global DNS Hijacking

Related Posts

‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data ‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data Cyber Security News
New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic Cyber Security News
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload Cyber Security News
Researchers Gain Access to StealC Malware Command-and-Control Systems Researchers Gain Access to StealC Malware Command-and-Control Systems Cyber Security News
Adobe Data Breach: 13 Million Records Allegedly Leaked Adobe Data Breach: 13 Million Records Allegedly Leaked Cyber Security News
New ClickFix Attacks as macOS Infostealer Leverages Official ChatGPT Website by Piggybacking New ClickFix Attacks as macOS Infostealer Leverages Official ChatGPT Website by Piggybacking Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack
  • Claude Mythos: A Revolutionary AI Model with Cybersecurity Implications
  • Phishing Campaigns Exploit RMM Tools for Unauthorized Access
  • Trent AI Launches with $13M Seed Funding Boost

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Why Automated Pentesting Needs a Broader Approach
  • Critical React2Shell Flaw Exploited in Major Cyberattack
  • Claude Mythos: A Revolutionary AI Model with Cybersecurity Implications
  • Phishing Campaigns Exploit RMM Tools for Unauthorized Access
  • Trent AI Launches with $13M Seed Funding Boost

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark