Threat IntelHIGH

Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft

Featured image for Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft
#APT28#FrostArmada#Microsoft 365#DNS hijacking#MikroTik

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupAPT28
AliasesFancy Bear, Sofacy
AttributionRussian GRU
Target SectorsGovernment, IT, Law Enforcement
Target RegionsGlobal
Active Since2025
Campaign NameFrostArmada
Primary TTPsDNS Hijacking, AiTM
Tools UsedMalicious VPS
MITRE ATT&CKT1071.001
MotivationCyber Espionage
🎯

Basically, hackers changed router settings to steal Microsoft logins from users worldwide.

Quick Summary

A major international operation has disrupted the FrostArmada campaign, which hijacked routers to steal Microsoft 365 logins. This attack affected thousands of devices worldwide, primarily targeting government and IT sectors. Authorities are now working to secure the compromised infrastructure and protect users from future threats.

What Happened

An international operation led by law enforcement has successfully disrupted FrostArmada, a campaign linked to the Russian threat group APT28 (also known as Fancy Bear). This operation targeted MikroTik and TP-Link routers, hijacking local traffic to steal Microsoft account credentials. The campaign was particularly active in late 2025, affecting approximately 18,000 devices across 120 countries.

Who's Affected

The primary targets of this attack included government agencies, law enforcement, IT providers, and organizations managing their own servers. The compromised routers were used to redirect traffic intended for Microsoft services, enabling attackers to capture sensitive login information.

How It Works

The attackers compromised routers by altering their DNS settings to point to malicious servers they controlled. This manipulation allowed them to intercept authentication traffic directed at Microsoft services. Victims would often see no signs of the attack, except for potential warnings about invalid TLS certificates, which could easily be ignored.

Tactics & Techniques

APT28 utilized sophisticated methods to execute these attacks, including the following:

  • DNS Hijacking: By changing DNS settings, they redirected users to their own servers.
  • Adversary-in-the-Middle (AiTM): They acted as intermediaries, collecting data from users as they accessed legitimate services.
  • Dynamic Host Configuration Protocol (DHCP): The attackers pushed new DNS settings automatically to internal devices, making detection difficult.

Defensive Measures

In response to this threat, Microsoft collaborated with Black Lotus Labs and other organizations to identify affected users and take down the malicious infrastructure. Recommendations for users include:

  • Implementing certificate pinning on corporate devices to prevent interception.
  • Patching routers and reducing exposure on the public web.
  • Removing outdated equipment that may be vulnerable to such attacks.

Conclusion

The disruption of the FrostArmada campaign illustrates the ongoing threat posed by APT28 and similar groups. As cyber threats evolve, it is crucial for organizations to remain vigilant and adopt robust security measures to protect sensitive information.

🔍 How to Check If You're Affected

  1. 1.Check router DNS settings for unauthorized changes.
  2. 2.Monitor for unusual traffic patterns or unexpected certificate warnings.
  3. 3.Implement logging to track DNS queries and responses.

🏢 Impacted Sectors

GovernmentTechnology

Pro Insight

🔒 Pro insight: The FrostArmada campaign highlights the importance of securing network infrastructure against DNS hijacking tactics employed by sophisticated threat actors.

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Related Pings

HIGHThreat Intel

Russian Hackers - Massive DNS Hijacking Attack Uncovered

Russian hackers are hijacking DNS traffic from home routers, affecting 200 organizations and 5,000 devices. This sophisticated attack poses serious risks to sensitive data. Immediate actions are needed to mitigate the threat.

Cyber Security News·
HIGHThreat Intel

Charming Kitten - Iran Group Leverages Social Engineering Tactics

Charming Kitten, an Iran-linked group, is ramping up cyber espionage efforts by using social engineering tactics. Targeting officials and researchers, they manipulate trust to access sensitive data. This shift in strategy highlights the need for enhanced cybersecurity awareness and training.

SC Media·
HIGHThreat Intel

APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed

APT28 hackers have been hijacking routers to steal credentials, with new insights revealing their tactics and the vulnerabilities exploited. The UK’s NCSC warns organizations to bolster their defenses.

Infosecurity Magazine·
HIGHThreat Intel

SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered

A Russian military-linked group is exploiting vulnerable home routers for DNS hijacking and adversary-in-the-middle attacks. Thousands of devices are affected, raising significant security concerns. Organizations must enhance their defenses against these tactics.

Microsoft Security Blog·
HIGHThreat Intel

Cybercrime - Industrialization and Its Implications Explained

Cybercrime has evolved into a serious industry affecting everyone. Experts stress the need for preparedness and public-private cooperation to combat this growing threat effectively.

Fortinet Threat Research·
HIGHThreat Intel

Russian Cyber Unit Exposed for Hijacking Home Routers

UK officials have exposed a Russian cyber unit hijacking home routers to spy on users. Weak security settings are being exploited, putting sensitive data at risk. Organizations are urged to secure their devices.

The Record·