Security researchers have uncovered a widespread, long-running cyber espionage campaign attributed to the Russian state-sponsored threat group APT28 (also known as Forest Blizzard, tracked by Microsoft as Storm-2754). The campaign, codenamed "FrostArmada" by Lumen's Black Lotus Labs, involves the mass compromise of insecure Small Office/Home Office (SOHO) routers, particularly from manufacturers MikroTik and TP-Link. Since at least May 2025, the attackers have been exploiting these devices to modify their DNS settings. This allows them to hijack victims' network traffic, redirecting it to attacker-controlled nodes to harvest authentication credentials and other sensitive data. The campaign has a global reach, targeting government agencies, law enforcement, and users of cloud services across Europe, North Africa, and the Americas before a law enforcement operation successfully disrupted the infrastructure.
The "FrostArmada" campaign leverages a network of compromised SOHO routers as a distributed, resilient infrastructure for cyber espionage. The core technique is DNS hijacking. By gaining administrative control over a vulnerable router, APT28 changes its DNS server settings to point to their own malicious servers. Consequently, all DNS queries from devices on that local network are sent to the attacker. When a user tries to access a targeted service (e.g., webmail, cloud provider), the attacker's DNS server provides the IP address of an Attacker-in-the-Middle (AitM) server instead of the legitimate one. This allows the actor to intercept the connection, harvest credentials, and passively collect data without any malware being installed on the victim's endpoint. The campaign targets are strategic, focusing on government ministries and cloud service providers to gather intelligence.
The campaign's TTPs are designed for stealth and scale:
T1190 - Exploit Public-Facing Application: APT28 exploits known vulnerabilities or weak/default credentials in the web administration interfaces of MikroTik and TP-Link routers exposed to the internet.T1555.003 - DNS Hijacking: The primary action on the device is to modify the DNS configuration. This is a subtle change that persists through reboots and is often invisible to end-users. The router itself becomes a malicious component of the attacker's infrastructure.T1557 - Man-in-the-Middle: By controlling DNS resolution, the attackers can perform AitM attacks against targeted domains, presenting fake login pages or intercepting authentication tokens.T1599 - Network Traffic Capture: The AitM nodes passively capture all traffic sent by the victim, including credentials, session cookies, and other sensitive data.The scale of the operation was massive. At its peak in December 2025, the infrastructure was communicating with over 18,000 unique IP addresses from 120 countries, having impacted over 200 organizations and 5,000 consumer devices.
For home users and small businesses, detection can be challenging. Key observables include:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| log_source | Router System Logs |
Check for unexpected reboots, configuration changes, or logins from unknown IP addresses. | Router administration interface. | medium |
| network_traffic_pattern | Unusual DNS Servers |
Check the DNS server settings on the router and on client devices (via ipconfig /all or cat /etc/resolv.conf). |
Compare the configured DNS servers against known public servers (e.g., 8.8.8.8, 1.1.1.1) or the ISP's provided servers. | high |
| certificate_subject | Mismatched Certificate |
Browser warnings about invalid or mismatched SSL/TLS certificates when visiting major websites. | User's web browser. | medium |
| log_source | DNS Query Logs |
For enterprises, monitor for large numbers of internal clients querying suspicious or known malicious DNS resolvers. | Corporate DNS server logs or SIEM. | high |
Detection:
D3-ACH - Application Configuration Hardening.D3-NTA - Network Traffic Analysis to spot anomalies.Response:
M1051 - Update Software: The most important mitigation is to keep router firmware up to date. This patches the vulnerabilities that APT28 exploits for initial access.M1042 - Disable or Remove Feature or Program: Disable the router's web-based administration interface from being accessible via the WAN/internet port. Management should only be possible from the local LAN.M1027 - Password Policies: Change the default administrative password on the router to a long, complex, and unique passphrase.Regularly update router firmware to patch vulnerabilities used for initial access.
Mapped D3FEND Techniques:
Disable remote/WAN administration on SOHO routers to prevent external exploitation.
Mapped D3FEND Techniques:
Replace default administrative passwords with strong, unique passphrases.
Mapped D3FEND Techniques:
Use DNS over HTTPS (DoH) to encrypt DNS queries, preventing them from being intercepted or redirected by a compromised router.
Mapped D3FEND Techniques:
The foundation of this attack is the weak default configuration of SOHO routers. The most critical hardening step is to disable remote administration from the WAN port. This single action prevents attackers from scanning the internet and directly accessing the router's login page. This should be the default setting for all SOHO devices. Secondly, users must immediately change the default administrator password (e.g., 'admin'/'admin') to a strong, unique passphrase. Finally, after ensuring the firmware is up-to-date, users should perform a configuration audit. Specifically, check the DHCP settings to see which DNS servers are being assigned to clients. These should be set to well-known, trusted resolvers (like 1.1.1.1, 8.8.8.8, or the user's ISP-provided servers), not unknown IP addresses. These three steps—disabling remote access, changing the password, and verifying DNS settings—directly counter the core TTPs of the FrostArmada campaign.
APT28 gains initial access by exploiting known vulnerabilities in outdated firmware on MikroTik and TP-Link routers. A consistent and timely software update process is a fundamental defense. Users and organizations should enable automatic firmware updates on their routers whenever possible. If automatic updates are not available, a quarterly manual check for new firmware on the manufacturer's official website should be standard practice. Before applying an update, it is crucial to back up the current router configuration. Applying the latest firmware patches the security holes that allow attackers to gain administrative access in the first place, effectively cutting off their primary infection vector. This is a simple but highly effective mitigation that prevents the entire attack chain from starting.
For corporate environments, network traffic analysis can detect compromised SOHO routers used by remote employees. Security teams should monitor DNS traffic originating from their VPN clients. Specifically, they can create detection rules that alert when a device's DNS queries are being sent to IP addresses that are not on an approved list of DNS resolvers. By baselining normal DNS traffic, it becomes possible to spot deviations that indicate a DNS hijacking attack. For example, if a remote user's machine suddenly starts sending DNS queries to an unknown IP address in a foreign country instead of the corporate DNS server or a public one, it is a strong indicator of compromise. This allows the security team to proactively notify the user to inspect and remediate their home router.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats