HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

APT28 Hijacks MikroTik & TP‑Link Routers to Steal Microsoft 365 Logins via DNS Redirection

APT28’s FrostArmada campaign compromised ~18 k SOHO routers, altered DNS settings, and harvested Microsoft 365 credentials. The operation underscores the third‑party risk of unmanaged networking hardware and the need for rigorous router hygiene.

🛡️ LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
5 recommended
📰
Source
bleepingcomputer.com

APT28 Hijacks MikroTik & TP-Link Routers to Steal Microsoft 365 Logins via DNS Redirection

What Happened – An international law‑enforcement operation disrupted “FrostArmada,” an APT28 campaign that compromised thousands of SOHO routers (primarily MikroTik and TP‑Link) and altered their DNS settings to route authentication traffic to attacker‑controlled VPS resolvers. The malicious DNS redirection captured Microsoft 365 credentials and OAuth tokens.

Why It Matters for TPRM

  • Credential theft from a trusted identity provider can cascade to every downstream SaaS service.
  • Router‑level DNS hijacks bypass traditional endpoint security, exposing any organization that relies on compromised network hardware.
  • The campaign’s global reach (≈18 k devices in 120 countries) shows the supply‑chain risk of unmanaged or legacy networking gear.

Who Is Affected – Government agencies, law‑enforcement bodies, IT/hosting providers, and any organization operating its own servers that rely on MikroTik, TP‑Link, Nethesis, or older Fortinet routers.

Recommended Actions

  • Inventory all on‑premise routers and verify firmware is up‑to‑date.
  • Audit DNS and DHCP configurations for unauthorized changes.
  • Enforce MFA on Microsoft 365 accounts and monitor for anomalous OAuth token usage.
  • Segment network traffic to limit exposure of compromised devices.

Technical Notes – Attack vector leveraged router misconfiguration (unauthorized DNS changes) pushed via DHCP, creating an adversary‑in‑the‑middle proxy that intercepted authentication requests. Victims only saw TLS‑certificate warnings, which were often ignored. No specific CVE was cited; the vulnerability stemmed from weak default credentials and unpatched router firmware. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/authorities-disrupt-dns-hijacks-used-to-steal-microsoft-365-logins/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.