APT28 'FrostArmada' Campaign Hijacks SOHO Routers for Global DNS Espionage

Russian APT28 Linked to 'FrostArmada' Campaign Compromising MikroTik and TP-Link Routers for DNS Hijacking

HIGH
April 8, 2026
5m read
Threat ActorCyberattackCyberattack

Related Entities

Threat Actors

Organizations

Lumen Black Lotus LabsMicrosoft MikroTik TP-Link

Full Report

Executive Summary

Security researchers have uncovered a widespread, long-running cyber espionage campaign attributed to the Russian state-sponsored threat group APT28 (also known as Forest Blizzard, tracked by Microsoft as Storm-2754). The campaign, codenamed "FrostArmada" by Lumen's Black Lotus Labs, involves the mass compromise of insecure Small Office/Home Office (SOHO) routers, particularly from manufacturers MikroTik and TP-Link. Since at least May 2025, the attackers have been exploiting these devices to modify their DNS settings. This allows them to hijack victims' network traffic, redirecting it to attacker-controlled nodes to harvest authentication credentials and other sensitive data. The campaign has a global reach, targeting government agencies, law enforcement, and users of cloud services across Europe, North Africa, and the Americas before a law enforcement operation successfully disrupted the infrastructure.


Threat Overview

The "FrostArmada" campaign leverages a network of compromised SOHO routers as a distributed, resilient infrastructure for cyber espionage. The core technique is DNS hijacking. By gaining administrative control over a vulnerable router, APT28 changes its DNS server settings to point to their own malicious servers. Consequently, all DNS queries from devices on that local network are sent to the attacker. When a user tries to access a targeted service (e.g., webmail, cloud provider), the attacker's DNS server provides the IP address of an Attacker-in-the-Middle (AitM) server instead of the legitimate one. This allows the actor to intercept the connection, harvest credentials, and passively collect data without any malware being installed on the victim's endpoint. The campaign targets are strategic, focusing on government ministries and cloud service providers to gather intelligence.


Technical Analysis

The campaign's TTPs are designed for stealth and scale:

  1. Initial Access: T1190 - Exploit Public-Facing Application: APT28 exploits known vulnerabilities or weak/default credentials in the web administration interfaces of MikroTik and TP-Link routers exposed to the internet.
  2. Persistence & Defense Evasion: T1555.003 - DNS Hijacking: The primary action on the device is to modify the DNS configuration. This is a subtle change that persists through reboots and is often invisible to end-users. The router itself becomes a malicious component of the attacker's infrastructure.
  3. Credential Access: T1557 - Man-in-the-Middle: By controlling DNS resolution, the attackers can perform AitM attacks against targeted domains, presenting fake login pages or intercepting authentication tokens.
  4. Collection: T1599 - Network Traffic Capture: The AitM nodes passively capture all traffic sent by the victim, including credentials, session cookies, and other sensitive data.

The scale of the operation was massive. At its peak in December 2025, the infrastructure was communicating with over 18,000 unique IP addresses from 120 countries, having impacted over 200 organizations and 5,000 consumer devices.


Impact Assessment

  • Espionage and Intelligence Gathering: The primary impact is the successful theft of credentials and sensitive data from high-value targets, including government officials and law enforcement. This intelligence can be used for further strategic operations.
  • Loss of Confidentiality: All network traffic from a compromised network is subject to interception, leading to a complete loss of privacy and confidentiality for users on that network.
  • Platform for Further Attacks: The compromised routers form a botnet that can be used to launch other attacks, such as DDoS or further phishing campaigns, obscuring the true origin of the malicious activity.
  • Difficulty in Detection: For the end-user, the only symptom might be intermittent connectivity issues or browser certificate warnings, which are often ignored. The compromise exists on the network edge device, not the endpoint, making it difficult for traditional antivirus to detect.

Cyber Observables for Detection

For home users and small businesses, detection can be challenging. Key observables include:

Type Value Description Context Confidence
log_source Router System Logs Check for unexpected reboots, configuration changes, or logins from unknown IP addresses. Router administration interface. medium
network_traffic_pattern Unusual DNS Servers Check the DNS server settings on the router and on client devices (via ipconfig /all or cat /etc/resolv.conf). Compare the configured DNS servers against known public servers (e.g., 8.8.8.8, 1.1.1.1) or the ISP's provided servers. high
certificate_subject Mismatched Certificate Browser warnings about invalid or mismatched SSL/TLS certificates when visiting major websites. User's web browser. medium
log_source DNS Query Logs For enterprises, monitor for large numbers of internal clients querying suspicious or known malicious DNS resolvers. Corporate DNS server logs or SIEM. high

Detection & Response

Detection:

  1. Configuration Auditing: Regularly audit the configuration of SOHO routers. Pay close attention to the configured DNS servers, firewall rules, and administrative accounts. D3-ACH - Application Configuration Hardening.
  2. Network Monitoring: In a corporate setting, monitor DNS traffic for queries directed to non-standard or unauthorized DNS servers. Use D3-NTA - Network Traffic Analysis to spot anomalies.
  3. External Scanning: Periodically scan your public IP space to identify any exposed router administration interfaces.

Response:

  • If a router is found to be compromised, the safest course of action is to perform a factory reset.
  • Immediately update the router's firmware to the latest version from the manufacturer.
  • After the reset, configure a strong, unique administrative password.
  • Manually configure trusted DNS servers (e.g., your ISP's, Google's, or Cloudflare's) and disable remote administration.

Mitigation

  • Update Firmware: M1051 - Update Software: The most important mitigation is to keep router firmware up to date. This patches the vulnerabilities that APT28 exploits for initial access.
  • Disable Remote Administration: M1042 - Disable or Remove Feature or Program: Disable the router's web-based administration interface from being accessible via the WAN/internet port. Management should only be possible from the local LAN.
  • Strong Credentials: M1027 - Password Policies: Change the default administrative password on the router to a long, complex, and unique passphrase.
  • Use DNS over HTTPS (DoH): Encourage users to enable DoH in their web browsers. This encrypts DNS queries, making them immune to hijacking by a compromised router.

Timeline of Events

1
May 1, 2025
The 'FrostArmada' campaign begins with limited activity.
2
August 1, 2025
A significant escalation in campaign activity is observed.
3
December 1, 2025
The malicious infrastructure reaches its peak, communicating with over 18,000 unique IPs.
4
April 1, 2026
A joint law enforcement operation, 'Operation Masquerade,' disrupts and takes down the infrastructure.
5
April 8, 2026
This article was published

MITRE ATT&CK Mitigations

Regularly update router firmware to patch vulnerabilities used for initial access.

Mapped D3FEND Techniques:

Disable remote/WAN administration on SOHO routers to prevent external exploitation.

Mapped D3FEND Techniques:

Replace default administrative passwords with strong, unique passphrases.

Mapped D3FEND Techniques:

Use DNS over HTTPS (DoH) to encrypt DNS queries, preventing them from being intercepted or redirected by a compromised router.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The foundation of this attack is the weak default configuration of SOHO routers. The most critical hardening step is to disable remote administration from the WAN port. This single action prevents attackers from scanning the internet and directly accessing the router's login page. This should be the default setting for all SOHO devices. Secondly, users must immediately change the default administrator password (e.g., 'admin'/'admin') to a strong, unique passphrase. Finally, after ensuring the firmware is up-to-date, users should perform a configuration audit. Specifically, check the DHCP settings to see which DNS servers are being assigned to clients. These should be set to well-known, trusted resolvers (like 1.1.1.1, 8.8.8.8, or the user's ISP-provided servers), not unknown IP addresses. These three steps—disabling remote access, changing the password, and verifying DNS settings—directly counter the core TTPs of the FrostArmada campaign.

APT28 gains initial access by exploiting known vulnerabilities in outdated firmware on MikroTik and TP-Link routers. A consistent and timely software update process is a fundamental defense. Users and organizations should enable automatic firmware updates on their routers whenever possible. If automatic updates are not available, a quarterly manual check for new firmware on the manufacturer's official website should be standard practice. Before applying an update, it is crucial to back up the current router configuration. Applying the latest firmware patches the security holes that allow attackers to gain administrative access in the first place, effectively cutting off their primary infection vector. This is a simple but highly effective mitigation that prevents the entire attack chain from starting.

For corporate environments, network traffic analysis can detect compromised SOHO routers used by remote employees. Security teams should monitor DNS traffic originating from their VPN clients. Specifically, they can create detection rules that alert when a device's DNS queries are being sent to IP addresses that are not on an approved list of DNS resolvers. By baselining normal DNS traffic, it becomes possible to spot deviations that indicate a DNS hijacking attack. For example, if a remote user's machine suddenly starts sending DNS queries to an unknown IP address in a foreign country instead of the corporate DNS server or a public one, it is a strong indicator of compromise. This allows the security team to proactively notify the user to inspect and remediate their home router.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SOHORouterDNS HijackingCyber EspionageMan-in-the-Middle

📢 Share This Article

Help others stay informed about cybersecurity threats