top of page

Feds dismantle Russia-backed espionage network operating across 18,000 devices

  • Apr 8
  • 2 min read

Key Findings


  • Russian GRU-attributed threat group Forest Blizzard compromised over 18,000 routers across 120+ countries for large-scale espionage before being neutralized

  • Attackers exploited known vulnerabilities in TP-Link and MicroTik routers to hijack DNS settings and steal credentials via man-in-the-middle attacks

  • Campaign impacted more than 200 organizations and at least 5,000 consumer devices globally, including government agencies and critical infrastructure sectors

  • FBI conducted court-authorized Operation Masquerade to reset DNS settings and prevent further exploitation across compromised U.S. routers

  • Espionage activity has ceased with gradual infrastructure decline observed over recent weeks


Background


Forest Blizzard, also known as APT28 and Fancy Bear, is a threat group attributed to Russia's Main Intelligence Directorate of the General Staff (GRU) Military Unit 26165. The group launched this widespread campaign targeting network edge devices after the UK's National Cyber Security Centre published a malware analysis report in August about a tool used to steal Microsoft Office credentials. Lumen's Black Lotus Labs observed the exploitation surge beginning the day after that publication.


Attack Methodology


The threat group employed adversary-in-the-middle attacks by hijacking router DNS settings to redirect traffic to fake domains mimicking legitimate services like Microsoft Outlook Web Access. This allowed them to intercept passwords, OAuth tokens, and credentials for Microsoft accounts and other cloud services. The attackers operated opportunistically at first, compromising routers before identifying targets of intelligence interest to the Russian government.


Targets and Impact


Forest Blizzard targeted individuals and organizations in military, government, and critical infrastructure sectors across multiple continents. Victims included government agencies and organizations in IT, telecom, and energy sectors. Lumen identified additional compromised targets linked to Afghanistan's government, foreign affairs ministries, and national law enforcement agencies in North Africa, Central America, and Southeast Asia. An unnamed European country's national identity platform was also affected. Notably, Lumen found no evidence of compromised U.S. government agencies, though the FBI remediated routers weaponized in over 23 U.S. states.


Takedown Operation


Operation Masquerade was a collaborative effort led by the FBI with support from the Justice Department, National Security Division, Lumen's Black Lotus Labs, and Microsoft Threat Intelligence. The operation involved court-authorized commands designed to reset DNS settings on compromised American routers and prevent the threat group from further exploiting their initial access point. Microsoft confirmed that company-owned assets or services were not compromised during the campaign, though sensitive information exposure through intercepted credentials remains a serious concern.


Sources


  • https://cyberscoop.com/forest-blizzard-apt28-routers-espionage-campaign-operation-masquerade/

  • https://x.com/TheCyberSecHub/status/2041665389013442782

  • https://www.socdefenders.ai/item/910a0333-1b54-433e-b3cd-d823a55ea9ee

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page