Threat IntelHIGH

SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered

Featured image for SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered
#Forest Blizzard#DNS Hijacking#Adversary-in-the-Middle#Microsoft Outlook#TLS

Original Reporting

MSMicrosoft Security Blog·Microsoft Threat Intelligence

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupForest Blizzard
AliasesSTRONTIUM
AttributionRussian Military Intelligence
Target SectorsGovernment, Telecommunications, Energy
Target RegionsGlobal
Active SinceAugust 2025
Campaign NameSOHO Router Compromise
Primary TTPsDNS Hijacking, Adversary-in-the-Middle
Tools Useddnsmasq
MITRE ATT&CKT1557.001 (Adversary-in-the-Middle)
MotivationIntelligence Gathering
🎯

Basically, hackers are using home routers to spy on people and steal information.

Quick Summary

A Russian military-linked group is exploiting vulnerable home routers for DNS hijacking and adversary-in-the-middle attacks. Thousands of devices are affected, raising significant security concerns. Organizations must enhance their defenses against these tactics.

What Happened

Forest Blizzard, a threat actor associated with the Russian military, has been exploiting insecure home and small-office (SOHO) routers since August 2025. By compromising these devices, they modify their settings to redirect Domain Name System (DNS) requests through their own malicious infrastructure. This allows them to collect sensitive data and conduct follow-on attacks, including adversary-in-the-middle (AiTM) operations against targeted domains.

Who's Behind It

The campaign is attributed to Forest Blizzard, also known as STRONTIUM, which primarily serves the intelligence needs of the Russian government. This actor has a history of targeting various sectors, including government, telecommunications, and energy, using sophisticated techniques to gather intelligence.

Tactics & Techniques

Forest Blizzard employs a multi-step attack chain:

  1. Compromise of SOHO Devices: They gain access to routers and alter their configurations to use actor-controlled DNS resolvers.
  2. DNS Hijacking: By leveraging the dnsmasq utility, they redirect DNS queries to their servers, allowing them to monitor and collect DNS traffic.
  3. Adversary-in-the-Middle Attacks: They conduct AiTM attacks on TLS connections, particularly against Microsoft Outlook on the web, enabling them to intercept sensitive information.

Defensive Measures

To mitigate the risks associated with this threat, organizations should:

  • Implement Zero Trust DNS to ensure devices only resolve DNS through trusted servers.
  • Monitor DNS traffic for anomalies and block known malicious domains.
  • Centralize identity management and enforce multifactor authentication (MFA) to protect against credential theft.
  • Educate employees about the risks of using home routers in corporate environments.

Conclusion

The exploitation of SOHO routers by Forest Blizzard highlights the vulnerabilities in home network devices. Organizations must take proactive steps to secure these devices and protect sensitive data from adversarial threats. Awareness and robust security practices are essential to defend against such sophisticated attacks.

🔍 How to Check If You're Affected

  1. 1.Monitor DNS logs for unusual query patterns.
  2. 2.Check for unauthorized changes in router settings.
  3. 3.Implement alerts for suspicious outbound DNS traffic.

🏢 Impacted Sectors

GovernmentTelecommunicationsEnergy

🗺️ MITRE ATT&CK Techniques

Pro Insight

🔒 Pro insight: The use of SOHO devices as attack vectors underscores the need for comprehensive security measures in remote work environments.

Sources

Original Report

MSMicrosoft Security Blog· Microsoft Threat Intelligence
Read Original

Related Pings

HIGHThreat Intel

Russian Hackers - Massive DNS Hijacking Attack Uncovered

Russian hackers are hijacking DNS traffic from home routers, affecting 200 organizations and 5,000 devices. This sophisticated attack poses serious risks to sensitive data. Immediate actions are needed to mitigate the threat.

Cyber Security News·
HIGHThreat Intel

Charming Kitten - Iran Group Leverages Social Engineering Tactics

Charming Kitten, an Iran-linked group, is ramping up cyber espionage efforts by using social engineering tactics. Targeting officials and researchers, they manipulate trust to access sensitive data. This shift in strategy highlights the need for enhanced cybersecurity awareness and training.

SC Media·
HIGHThreat Intel

APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed

APT28 hackers have been hijacking routers to steal credentials, with new insights revealing their tactics and the vulnerabilities exploited. The UK’s NCSC warns organizations to bolster their defenses.

Infosecurity Magazine·
HIGHThreat Intel

Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft

A major international operation has disrupted the FrostArmada campaign, which hijacked routers to steal Microsoft 365 logins. This attack affected thousands of devices worldwide, primarily targeting government and IT sectors. Authorities are now working to secure the compromised infrastructure and protect users from future threats.

BleepingComputer·
HIGHThreat Intel

Cybercrime - Industrialization and Its Implications Explained

Cybercrime has evolved into a serious industry affecting everyone. Experts stress the need for preparedness and public-private cooperation to combat this growing threat effectively.

Fortinet Threat Research·
HIGHThreat Intel

Russian Cyber Unit Exposed for Hijacking Home Routers

UK officials have exposed a Russian cyber unit hijacking home routers to spy on users. Weak security settings are being exploited, putting sensitive data at risk. Organizations are urged to secure their devices.

The Record·