Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

629+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Russia's Forest Blizzard Harvests Logins via SOHO Router DNS Poisoning
Russia's Forest Blizzard Harvests Logins via SOHO Router DNS Poisoning
NEWS

Russia's Forest Blizzard Harvests Logins via SOHO Router DNS Poisoning

Russia's APT28 (Forest Blizzard) is conducting a malwareless espionage campaign by modifying a single DNS setting in vulnerable SOHO routers to silently harvest credentials from global organizations without deploying any malware on target endpoints.

Dylan H.

News Desk

April 9, 2026
6 min read

Russia's APT28 threat group — tracked by Microsoft as Forest Blizzard and also known as Fancy Bear, STRONTIUM, and Pawn Storm — has been observed conducting a novel "malwareless" espionage campaign that harvests login credentials from global organizations by modifying a single DNS setting in vulnerable small office/home office (SOHO) routers. The technique requires no malware on victim endpoints, making it exceptionally difficult to detect through traditional endpoint security tools.

The Attack: One DNS Change, Unlimited Credential Harvesting

The elegance of this campaign lies in its simplicity. Rather than deploying custom malware or exploiting complex software vulnerabilities on target systems, Forest Blizzard:

  1. Identifies and compromises vulnerable SOHO routers at or near target organizations — routers running outdated firmware, using default credentials, or exposed to public management interfaces
  2. Modifies the router's DNS server settings to point to an attacker-controlled DNS resolver
  3. Operates a malicious DNS resolver that responds to DNS queries for targeted services (email portals, VPN gateways, Microsoft 365, cloud services) with IP addresses pointing to attacker-controlled phishing proxies
  4. All devices on the network automatically route credential-bearing traffic through the poisoned DNS without any configuration change on the endpoints themselves
  5. Captured credentials are silently logged for later use in espionage operations

The attack is described by researchers as "fileless malware" taken to its logical extreme — it is not merely fileless on the endpoint, it requires no malware anywhere in the victim's environment at all.

Why SOHO Routers Are the Perfect Entry Point

SOHO routers represent a persistently underprotected segment of the network attack surface:

Vulnerability FactorDetail
Default credentialsA large proportion of deployed SOHO routers retain manufacturer default admin passwords
Outdated firmwareRouter firmware is rarely updated; many run firmware years out of date with known CVEs
Exposed management interfacesMany routers have web UIs or Telnet/SSH exposed to the internet
No EDR/AV coverageEndpoint security tools have zero visibility into router configuration changes
Trusted network positionRouters sit upstream of all endpoint traffic — DNS modifications affect every device simultaneously
Low detection rateDNS setting changes generate no alerts in standard SIEM/SOC monitoring

For a nation-state actor like APT28 with extensive capabilities for scanning and exploiting internet-exposed devices, gaining control of SOHO routers at target organizations is a relatively low-cost operation with exceptional intelligence yield.

Targets and Scope

Forest Blizzard has historically targeted organizations aligned with Russian geopolitical intelligence priorities:

  • Government ministries and agencies across NATO member states
  • Defence contractors and defence industrial base organizations
  • Energy sector companies in Europe and North America
  • Think tanks and NGOs engaged in Eastern European security policy
  • Media organizations covering Russian government and military affairs

The DNS-based credential harvesting technique is particularly effective against organizations where employees use web-based email (Microsoft 365, Google Workspace), VPN portals, or cloud services — essentially all modern organizations.

How the Attack Remains Undetected

Several properties of this technique make it unusually difficult to detect:

No Endpoint Artifacts

Traditional detection methods — EDR behavioral monitoring, antivirus scanning, memory analysis — have nothing to detect. No malicious binary executes, no malicious process runs, no file is dropped on any endpoint.

DNS Changes Are Rarely Monitored

Most organizations monitor endpoint logs, firewall logs, and server logs, but few baseline and monitor DNS configuration on network devices. A DNS server change on a SOHO router generates no alert in most SOC environments.

Traffic Appears Legitimate

From the network perspective, users successfully authenticate to what appears to be their normal services. The phishing proxy passes through traffic after capturing credentials, so users may notice no service disruption.

Certificate Challenges (but Surmountable)

For HTTPS services, the phishing proxy would normally trigger certificate warnings. APT28 is assessed to have obtained or forged certificates, use HSTS bypass techniques, or target environments where certificate validation has been weakened.

Detection and Mitigation

For Organisations

ControlImplementation
Audit SOHO router DNS settingsRegularly verify that router DNS settings match expected values (ISP DNS or org-approved resolvers)
Replace SOHO routers in sensitive rolesUse enterprise-grade managed networking equipment that supports config auditing and change alerts
DNSSEC validationEnable DNSSEC where possible to cryptographically validate DNS responses
DNS-over-HTTPS (DoH) / DNS-over-TLS (DoT)Force endpoints to use encrypted DNS to bypass router-level DNS hijacking
Phishing-resistant MFAFIDO2/WebAuthn hardware keys are not susceptible to credential harvesting via phishing proxies
Zero Trust Network Access (ZTNA)Device health verification and identity verification at every access request reduces reliance on network-layer trust
Network monitoring for DNS anomaliesAlert on DNS resolution returning unexpected IPs for known organizational services

For SOHO Router Owners

# Immediate checks:
# 1. Log in to your router admin panel
# 2. Navigate to WAN settings or Internet settings
# 3. Verify DNS server settings — should match your ISP's DNS or your chosen resolver
#    (e.g., 1.1.1.1 / 8.8.8.8 — NOT an unfamiliar IP)
# 4. Check for any admin account additions you did not create
# 5. Verify firmware version — update if outdated
 
# If DNS settings are unexpected:
# - Reset router to factory defaults
# - Apply latest firmware immediately
# - Change all admin credentials to strong unique passwords
# - Disable remote management if not required

APT28 in Context

APT28 (GRU Military Unit 26165) is one of Russia's most persistent and capable cyber espionage groups. The group has been responsible for:

  • Operation Olympic Destroyer — destructive attack on the 2018 Winter Olympics
  • DNC breach (2016) — election interference operations
  • WADA hack — theft and leak of athlete medical records
  • Ongoing Ukraine targeting — sustained campaign since 2022

The SOHO router DNS hijacking technique represents a maturation in APT28's operational tradecraft: by moving the attack upstream of the endpoint entirely, the group sidesteps the increasingly capable endpoint detection tools deployed by their targets. It is a reminder that network device security is as important as endpoint security in defending against nation-state adversaries.


Source: Dark Reading — Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers

#APT28#Forest Blizzard#Russia#SOHO Router#DNS Hijacking#Espionage#Malware#APT#Nation-State

Related Articles

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Russian state-sponsored threat actor APT28 (Forest Blizzard / Pawn Storm) has launched a targeted spear-phishing campaign deploying a newly documented malware suite called PRISMEX, combining steganography, COM hijacking, and multi-stage persistence against Ukraine and NATO-aligned governments.

5 min read

Authorities Disrupt APT28 Router DNS Hijacks Targeting Microsoft 365

An international law enforcement operation has dismantled FrostArmada, an APT28 campaign that hijacked DNS on compromised MikroTik and TP-Link routers to intercept and steal Microsoft 365 account credentials at scale.

4 min read

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three threat activity clusters aligned with China jointly targeted a Southeast Asian government organization in a complex, well-resourced espionage...

5 min read
Back to all News