FBI Disrupts APT28's FrostArmada Router Hijacking Campaign
FBI-led Operation Masquerade dismantled Russia's GRU-linked FrostArmada, which compromised 18,000+ routers to steal Microsoft 365 credentials via DNS hijacking.
The FBI and international partners have dismantled FrostArmada, a sprawling Russian intelligence operation that hijacked over 18,000 home and small office routers across 120 countries to intercept Microsoft 365 credentials. The court-authorized takedown, dubbed Operation Masquerade, marks one of the largest disruptions of Russian cyber espionage infrastructure to date.
How the Attack Worked
APT28, the GRU military intelligence unit also tracked as Fancy Bear and Forest Blizzard, exploited insecure SOHO routers to overwrite DNS settings and redirect victims to attacker-controlled servers. When compromised devices requested legitimate domains—particularly those mimicking Microsoft Outlook Web Access—traffic was silently routed to adversary-in-the-middle nodes.
"Credentials were harvested and exfiltrated," Lumen's Black Lotus Labs noted in their technical analysis, describing how the operation enabled passive collection without deploying traditional malware on endpoints.
The campaign particularly targeted TP-Link WR841N routers via CVE-2023-50224, a vulnerability that lets unauthenticated attackers extract stored credentials through crafted HTTP requests. MikroTik devices were also compromised for more targeted operations in Ukraine.
Scale and Timeline
Black Lotus Labs tracked the campaign from its limited beginnings in May 2025 through aggressive expansion in early August. By December 2025, the operation peaked with over 18,000 unique IP addresses communicating with APT28 infrastructure daily.
Microsoft's Threat Intelligence Center identified 200+ organizations and 5,000 consumer devices affected by the malicious DNS infrastructure. The geographic spread aligned with Russian strategic interests—government agencies, defense contractors, and diplomatic missions across NATO countries and Ukraine.
This isn't APT28's first router-based operation. The group has a documented history of exploiting edge devices for credential theft, building infrastructure that's harder to attribute and disrupt than traditional command-and-control servers.
The Disruption
Operation Masquerade involved a court-authorized FBI technical operation to secure compromised routers. According to the Department of Justice announcement, agents remotely reset DNS configurations on identified devices, severing connections to APT28's harvesting infrastructure.
The operation required coordination across multiple countries, with law enforcement agencies in Europe and elsewhere executing parallel actions against servers hosting the malicious DNS resolvers.
Private sector partners including Lumen, Microsoft, and several threat intelligence firms contributed telemetry and technical support. The collaboration model mirrors successful takedowns of other nation-state campaigns targeting critical infrastructure.
Why This Matters
FrostArmada demonstrates how commodity router vulnerabilities can enable sophisticated nation-state espionage at scale. The attack required no zero-days, no custom malware on victim endpoints, and no phishing. Adversaries simply positioned themselves in the network path and waited for credentials to flow through.
For organizations targeted by Russian intelligence, the implications are stark: even with robust endpoint security and phishing-resistant MFA, credentials can be intercepted when network infrastructure is compromised upstream. This operational pattern echoes the multi-year Sandworm campaign targeting the energy sector that Amazon disrupted late last year.
The campaign also highlights ongoing risks from unpatched SOHO equipment. Most victims had no idea their routers were participating in a GRU operation. Device manufacturers ship products with weak default credentials and delayed security updates, creating persistent vulnerabilities that threat actors exploit years after disclosure.
Detection and Remediation
Organizations concerned about FrostArmada exposure should:
- Check router DNS settings for unauthorized modifications pointing to unfamiliar resolver addresses
- Review Microsoft 365 sign-in logs for authentication from unexpected geographic locations or IP ranges
- Enable conditional access policies that block sign-ins from high-risk countries where you have no business operations
- Update router firmware and change default credentials on all edge network devices
Microsoft recommends enabling number matching for MFA push notifications to reduce effectiveness of real-time phishing even when attackers have intercepted initial credentials.
For deeper understanding of credential theft techniques and defense strategies, our phishing defense guide covers both technical and human factors in credential protection.
The disruption provides temporary relief, but APT28 has repeatedly demonstrated ability to rebuild infrastructure after takedowns. Security teams should treat this as an opportunity to harden defenses, not a signal that the threat has passed.
Related Articles
Device Code Phishing Hits 340+ Microsoft 365 Orgs in 5 Countries
EvilTokens phishing platform targets Microsoft 365 identities across US, Canada, Australia, New Zealand, and Germany. OAuth abuse bypasses MFA to steal access tokens.
Mar 26, 2026FBI Warns Russian Hackers Compromised Thousands of Signal, WhatsApp Accounts
FBI and CISA alert reveals Russian intelligence operatives have hijacked thousands of Signal and WhatsApp accounts belonging to US officials, military, and journalists through phishing attacks.
Mar 22, 2026APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine
Russian GRU-linked APT28 deploys BEARDSHELL and COVENANT implants for long-term surveillance of Ukrainian military personnel. ESET research reveals cloud storage abuse for C2.
Mar 10, 2026APT28 Linked to MSHTML Zero-Day Exploited Before Patch
Security researchers tie Russia's APT28 to CVE-2026-21513 exploitation using malicious LNK files. The MSHTML zero-day was weaponized weeks before Microsoft's February patch.
Mar 3, 2026