NextFin

Russian Military Hackers Hijack 18,000 Routers to Bypass Microsoft MFA Tokens

Summarized by NextFin AI
  • A sophisticated cyber-espionage campaign linked to Russian military intelligence has compromised over 18,000 internet routers globally, intercepting Microsoft Office authentication tokens without malware.
  • The operation, attributed to Forest Blizzard, exploited vulnerabilities in aging Small Office/Home Office routers, allowing attackers to perform adversary-in-the-middle attacks and gain full account access.
  • Microsoft identified over 200 organizations and 5,000 consumer devices impacted, with surveillance reaching 120 countries, indicating a vast yet targeted breach.
  • Despite the effectiveness of DNS hijacking tactics, analysts caution that the shift towards DNS-over-HTTPS and modern security architectures may eventually mitigate these vulnerabilities.

NextFin News - A sophisticated cyber-espionage campaign linked to Russian military intelligence has compromised more than 18,000 internet routers globally to intercept Microsoft Office authentication tokens, bypassing traditional multi-factor authentication (MFA) without deploying a single line of malware. The operation, attributed to the threat actor known as Forest Blizzard (also identified as APT28 or Fancy Bear), represents a significant shift in state-sponsored hacking tactics toward "living-off-the-land" techniques that exploit aging infrastructure rather than software vulnerabilities.

According to a joint investigation by Microsoft and Black Lotus Labs, the security arm of internet backbone provider Lumen, the hackers targeted end-of-life Small Office/Home Office (SOHO) routers, primarily manufactured by MikroTik and TP-Link. By exploiting known vulnerabilities in these unpatched devices, the group modified Domain Name System (DNS) settings to redirect traffic through attacker-controlled virtual private servers. This maneuver allowed the GRU-linked actors to perform "adversary-in-the-middle" attacks, capturing OAuth tokens as users logged into Microsoft Outlook and other cloud services. Because these tokens are generated after a successful login, the attackers gained full account access while effectively neutralizing the protection offered by one-time passcodes or biometric checks.

The scale of the breach is vast, yet surgical in its targeting. Microsoft identified over 200 organizations and 5,000 consumer devices directly impacted, with the broader surveillance net reaching 120 countries. Ryan English, a security engineer at Black Lotus Labs, noted that the campaign reached its peak in December 2025. English, who has spent years tracking state-sponsored infrastructure, characterized the approach as a "graybeard" method—eschewing flashy, modern malware for fundamental networking manipulation that is harder for traditional antivirus software to detect. His assessment suggests that the simplicity of the attack is precisely what made it so effective against government agencies, ministries of foreign affairs, and law enforcement entities.

This tactical pivot follows a pattern of rapid adaptation by Russian cyber units. Danny Adamitis, also of Black Lotus Labs, observed that Forest Blizzard significantly expanded its DNS hijacking operations immediately after a previous report from the U.K.’s National Cyber Security Centre (NCSC) in August 2025 exposed their use of router-based malware. Rather than retreating, the group abandoned the malware in favor of the more systemic, script-based DNS alteration discovered this week. This suggests a high degree of operational flexibility and a deep inventory of unpatched SOHO vulnerabilities ready for deployment.

While the technical evidence points toward a highly successful breach, some industry analysts urge caution in overstating the long-term viability of such tactics. Security researchers at several independent firms have noted that while DNS hijacking is effective against older hardware, the industry-wide push toward DNS-over-HTTPS (DoH) and more robust Zero Trust architectures could eventually close this specific window of opportunity. Furthermore, the reliance on "end-of-life" hardware means the attackers are fishing in a shrinking pond as organizations modernize their edge networking equipment. For now, however, the thousands of unpatched routers remaining on the periphery of corporate and government networks remain a critical, low-cost entry point for state-level actors.

Explore more exclusive insights at nextfin.ai.

Insights

What are living-off-the-land techniques in cyber-espionage?

What vulnerabilities were exploited in the compromised routers?

How does the latest Russian hacking campaign differ from traditional malware attacks?

What impact did the hacking campaign have on global organizations?

What are the current trends in cybersecurity regarding router vulnerabilities?

What updates have emerged about the Forest Blizzard hacking group?

How are organizations responding to the threat of DNS hijacking?

What is the significance of DNS-over-HTTPS in combating such attacks?

What challenges do organizations face in securing end-of-life routers?

How do modern cybersecurity strategies differ from traditional approaches?

What lessons can be learned from the Forest Blizzard cyber campaign?

What are the long-term implications of using aging infrastructure in cyberattacks?

How might future cyber-espionage tactics evolve in response to increased security measures?

What are the key differences between the Forest Blizzard group and other hacking groups?

What are the main criticisms regarding the effectiveness of current antivirus solutions?

Search
NextFinNextFin
NextFin.Al
No Noise, only Signal.
Open App