HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Russian GRU Hijacks 18,000 Routers to Steal Microsoft Office OAuth Tokens

State‑backed Russian GRU hackers compromised over 18,000 legacy routers, re‑routing DNS to attacker‑controlled servers and silently harvesting Microsoft Office OAuth tokens. The campaign, dubbed Forest Blizzard, targeted government ministries and other organizations, exposing a critical supply‑chain risk for third‑party network providers.

🛡️ LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 krebsonsecurity.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
krebsonsecurity.com

Russian GRU Hijacks 18,000 Routers to Steal Microsoft Office OAuth Tokens

What Happened — State‑backed Russian GRU actors (APT28/Forest Blizzard) compromised more than 18,000 legacy routers, re‑routing DNS to attacker‑controlled servers and silently harvesting Microsoft Office OAuth tokens. No malware was installed; the attack relied on known router vulnerabilities and DNS hijacking.

Why It Matters for TPRM

  • Token theft bypasses multi‑factor authentication, exposing confidential corporate data.
  • The campaign targets government and SOHO networks, highlighting supply‑chain risk from outdated hardware.
  • Third‑party vendors that provide or manage network infrastructure may inadvertently expose clients.

Who Is Affected — Government ministries, law‑enforcement agencies, third‑party email providers, and any organization using unsupported Mikrotik or TP‑Link routers.

Recommended Actions

  • Inventory all routers, prioritize replacement of end‑of‑life devices.
  • Verify DNS settings on network equipment; revert any unauthorized changes.
  • Enforce token‑level security controls (e.g., conditional access, token revocation) for Office 365 users.

Technical Notes — Attack vector: exploitation of known router firmware flaws → DNS hijacking → interception of OAuth tokens transmitted after MFA. No CVE numbers were disclosed in the source article. Data types stolen: Microsoft Office OAuth access tokens, potentially granting read/write access to email, documents, and Teams. Source: Krebs on Security

📰 Original Source
https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.