Russian hackers hijack SOHO routers to spy on traffic and intercept logins


A Russian state-linked cyber campaign has compromised home and small-office routers to hijack DNS traffic and help intercept sensitive communications. Microsoft said the activity has affected more than 200 organizations and over 5,000 consumer devices, with targets spanning government, telecom, IT, and energy.

Microsoft attributes the operation to Forest Blizzard, also known as APT28 or Strontium, and linked part of the activity to Storm-2754. The company said the actors have targeted insecure SOHO routers since at least August 2025, then changed DNS settings to turn those devices into covert intelligence infrastructure.

The campaign matters because it shifts the attack surface away from hardened enterprise networks and toward neglected edge devices in homes and remote offices. Once a router is compromised, every connected laptop, phone, and workstation can start sending DNS traffic through infrastructure controlled by the attackers.

How the router hijacking works

Microsoft said the attackers first gain access to poorly secured SOHO routers, then replace legitimate DNS resolvers with actor-controlled ones. Because endpoint devices inherit network settings automatically over DHCP, victims may never notice the change while their DNS lookups move to hostile servers.

Forest-Blizzard-DNS-hijcaking-attack-chain

The company said Forest Blizzard likely uses dnsmasq, a common DNS forwarding and DHCP service built into many routers, to observe and respond to DNS queries on port 53. That gives the group passive visibility into domain lookups without the noise that often comes with direct intrusion into enterprise systems.

For higher-value targets, the campaign goes further. Microsoft and the UK’s NCSC said the attackers used adversary-in-the-middle techniques by returning spoofed IP addresses for specific domains, which redirected victims to attacker-controlled infrastructure that served fake TLS certificates.

Why this campaign is more dangerous

If a victim ignores the certificate warning, the TLS session can continue through the attacker’s system. Microsoft said that flow allowed Forest Blizzard to collect plaintext traffic, including credentials, email content, and cloud-hosted data from selected targets.

Microsoft said it observed AiTM activity against Microsoft Outlook on the web domains, as well as non-Microsoft government servers in at least three African countries. The company also said no Microsoft-owned assets or services were compromised in the campaign itself.

This appears to mark a notable operational step for APT28. Microsoft said it was the first time it had seen Forest Blizzard use DNS hijacking at this scale specifically to enable TLS AiTM attacks after edge-device compromise, while the NCSC said the activity shows how vulnerable routers can support espionage against both organizations and individuals.

Key facts at a glance

ItemConfirmed detail
Threat actorForest Blizzard, also known as APT28 or Strontium
Microsoft subgroupStorm-2754
Activity startAt least August 2025
Main techniqueSOHO router compromise and DNS hijacking
Follow-on techniqueAdversary-in-the-middle TLS interception
Confirmed impact200+ organizations and 5,000+ consumer devices
Sectors hitGovernment, IT, telecom, energy
Notable lure outcomeSpoofed DNS replies and invalid TLS certificates

What defenders should do now

  • Reboot and update router firmware, especially on home and small-office devices that may lag behind on security patches.
  • Replace default router passwords and remove weak or reused credentials.
  • Audit DNS resolver settings on endpoints and routers for unauthorized changes.
  • Train users never to bypass certificate warnings, especially on email and cloud login pages.
  • Use VPNs and segment remote worker traffic so compromised home routers have less direct visibility into enterprise services.
  • Hunt for anomalous DNS changes in endpoint and network telemetry using vendor detections where available.

Why remote workers should pay attention

This campaign shows that a cheap router in a home office can become part of a nation-state espionage chain. An attacker does not need to break into Microsoft 365 or a company VPN first if they can manipulate the DNS traffic flowing out of an employee’s network.

The risk rises further when unsupported devices stay online for years without updates. The NCSC warned that vulnerable routers can enable credential theft, fake website redirection, and follow-on compromise across connected devices.

US authorities have already moved to disrupt part of the infrastructure. The Justice Department said the FBI identified and reset compromised routers in the United States after securing court authorization to cut Russian intelligence access to the hijacking network.

FAQ

Who is behind the router hijacking campaign?

Microsoft attributed the campaign to Forest Blizzard, also known as APT28 or Strontium, a threat actor linked to Russian military intelligence.

What devices are being targeted?

The campaign focuses on insecure SOHO routers used in homes and small offices, especially devices that are exposed, outdated, or poorly secured.

How does DNS hijacking help attackers?

It lets attackers control where victims go when they try to reach a domain. In this campaign, that control supported traffic monitoring and selective redirection to fake servers for credential interception.

What should users do first?

Update router firmware, change default passwords, verify DNS settings, and never click through certificate warnings. Organizations should also assume unmanaged home routers are a real enterprise risk.1

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages