radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

sourceBleeping Computer
calendar_todayApril 7, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Global Crackdown Thwarts DNS Hijacks Targeting Microsoft 365 Credentials

Summary

An international law enforcement operation has successfully disrupted a cyber campaign known as FrostArmada, which was hijacking DNS traffic from MikroTik and TP-Link routers to steal Microsoft 365 login credentials.

Key Points

  • The operation targeted an APT28 campaign named FrostArmada.
  • FrostArmada was hijacking DNS traffic from MikroTik and TP-Link routers.
  • The campaign aimed to steal Microsoft 365 account credentials.
  • The disruption was a collaborative effort between law enforcement and private companies.

Analysis

This operation highlights the persistent threat posed by state-sponsored groups like APT28, which target widely-used products to exploit vulnerabilities and gain unauthorized access to sensitive information. The focus on Microsoft 365 credentials underscores the value of cloud-based services to attackers and the need for robust security measures.

Conclusion

IT professionals should ensure that routers, especially those from MikroTik and TP-Link, are updated with the latest firmware to mitigate DNS hijacking risks. Additionally, implementing multi-factor authentication for Microsoft 365 accounts can provide an extra layer of security against credential theft.