Home OSINT News Signals
CYBER

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

🕓 1 min read

EXCLUSIVE: GLOBAL CYBER POLICE SMASH APT28'S "FROSTARMADA" IN MAJOR ROUTER HIJACK CRACKDOWN

An international law enforcement task force has delivered a crippling blow to a sophisticated state-aligned hacking campaign, exposing a global infrastructure designed to hijack your internet traffic and steal everything. Dubbed "FrostArmada," this operation by the notorious APT28 group was actively compromising thousands of consumer and small business routers to launch devastating phishing attacks, redirecting users to fake Microsoft 365 login pages to harvest credentials in real-time. This was not a simple malware infection; it was a systemic takeover of critical network hardware.

The core of the scheme was a brazen DNS hijack, targeting vulnerable MikroTik and TP-Link routers worldwide. By exploiting unpatched flaws, hackers rerouted all local traffic through their own malicious servers. Every attempt to access email, documents, or cloud services became an opportunity for credential theft, paving the way for catastrophic data breaches and potential ransomware deployment. This campaign turned common routers into silent, compliant spies for a foreign adversary.

Experts warn this operation highlights a terrifying trend in cybersecurity. "This is a masterclass in infrastructure-level compromise," a senior threat intelligence analyst told us. "They didn't just use a phishing email; they weaponized the very device that provides your internet. It bypasses most endpoint security and targets everyone on the network simultaneously. The discovery and patching of the underlying vulnerability is critical, but the sophistication points to deep resources and patience."

You should care because your router is your digital front door, and it's often left unlocked. This campaign didn't discriminate—home offices, local businesses, and even larger organizations were all at risk. The stolen Microsoft credentials are a golden ticket to corporate data, enabling further espionage or financial crimes. While blockchain security often focuses on crypto wallets, this incident shows that the foundational hardware of our digital lives remains a soft target for exploitation.

We predict this takedown is merely a temporary setback for APT28 and similar groups. The blueprint for router-based attacks is now public, and copycats will emerge. The urgent lesson is that network hygiene—changing default passwords, updating firmware, and monitoring for strange DNS settings—is no longer optional. It is your last line of defense.

Your internet was never safe. Now you know why.

Telegram X LinkedIn
Back to News