PROBABLYPWNED
Threat IntelligenceApril 10, 20264 min read

FBI Disrupts APT28's FrostArmada Router Hijacking Campaign

FBI-led Operation Masquerade dismantled Russia's GRU-linked FrostArmada, which compromised 18,000+ routers to steal Microsoft 365 credentials via DNS hijacking.

Alex Kowalski

The FBI and international partners have dismantled FrostArmada, a sprawling Russian intelligence operation that hijacked over 18,000 home and small office routers across 120 countries to intercept Microsoft 365 credentials. The court-authorized takedown, dubbed Operation Masquerade, marks one of the largest disruptions of Russian cyber espionage infrastructure to date.

How the Attack Worked

APT28, the GRU military intelligence unit also tracked as Fancy Bear and Forest Blizzard, exploited insecure SOHO routers to overwrite DNS settings and redirect victims to attacker-controlled servers. When compromised devices requested legitimate domains—particularly those mimicking Microsoft Outlook Web Access—traffic was silently routed to adversary-in-the-middle nodes.

"Credentials were harvested and exfiltrated," Lumen's Black Lotus Labs noted in their technical analysis, describing how the operation enabled passive collection without deploying traditional malware on endpoints.

The campaign particularly targeted TP-Link WR841N routers via CVE-2023-50224, a vulnerability that lets unauthenticated attackers extract stored credentials through crafted HTTP requests. MikroTik devices were also compromised for more targeted operations in Ukraine.

Scale and Timeline

Black Lotus Labs tracked the campaign from its limited beginnings in May 2025 through aggressive expansion in early August. By December 2025, the operation peaked with over 18,000 unique IP addresses communicating with APT28 infrastructure daily.

Microsoft's Threat Intelligence Center identified 200+ organizations and 5,000 consumer devices affected by the malicious DNS infrastructure. The geographic spread aligned with Russian strategic interests—government agencies, defense contractors, and diplomatic missions across NATO countries and Ukraine.

This isn't APT28's first router-based operation. The group has a documented history of exploiting edge devices for credential theft, building infrastructure that's harder to attribute and disrupt than traditional command-and-control servers.

The Disruption

Operation Masquerade involved a court-authorized FBI technical operation to secure compromised routers. According to the Department of Justice announcement, agents remotely reset DNS configurations on identified devices, severing connections to APT28's harvesting infrastructure.

The operation required coordination across multiple countries, with law enforcement agencies in Europe and elsewhere executing parallel actions against servers hosting the malicious DNS resolvers.

Private sector partners including Lumen, Microsoft, and several threat intelligence firms contributed telemetry and technical support. The collaboration model mirrors successful takedowns of other nation-state campaigns targeting critical infrastructure.

Why This Matters

FrostArmada demonstrates how commodity router vulnerabilities can enable sophisticated nation-state espionage at scale. The attack required no zero-days, no custom malware on victim endpoints, and no phishing. Adversaries simply positioned themselves in the network path and waited for credentials to flow through.

For organizations targeted by Russian intelligence, the implications are stark: even with robust endpoint security and phishing-resistant MFA, credentials can be intercepted when network infrastructure is compromised upstream. This operational pattern echoes the multi-year Sandworm campaign targeting the energy sector that Amazon disrupted late last year.

The campaign also highlights ongoing risks from unpatched SOHO equipment. Most victims had no idea their routers were participating in a GRU operation. Device manufacturers ship products with weak default credentials and delayed security updates, creating persistent vulnerabilities that threat actors exploit years after disclosure.

Detection and Remediation

Organizations concerned about FrostArmada exposure should:

  1. Check router DNS settings for unauthorized modifications pointing to unfamiliar resolver addresses
  2. Review Microsoft 365 sign-in logs for authentication from unexpected geographic locations or IP ranges
  3. Enable conditional access policies that block sign-ins from high-risk countries where you have no business operations
  4. Update router firmware and change default credentials on all edge network devices

Microsoft recommends enabling number matching for MFA push notifications to reduce effectiveness of real-time phishing even when attackers have intercepted initial credentials.

For deeper understanding of credential theft techniques and defense strategies, our phishing defense guide covers both technical and human factors in credential protection.

The disruption provides temporary relief, but APT28 has repeatedly demonstrated ability to rebuild infrastructure after takedowns. Security teams should treat this as an opportunity to harden defenses, not a signal that the threat has passed.

Related Articles