{"id":5091,"date":"2026-04-08T21:39:11","date_gmt":"2026-04-08T21:39:11","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/04\/08\/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers\/"},"modified":"2026-04-08T21:39:11","modified_gmt":"2026-04-08T21:39:11","slug":"us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2026\/04\/08\/us-thwarts-dns-hijacking-network-controlled-by-russian-apt28-hackers\/","title":{"rendered":"US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A large-scale network of internet routers compromised by Russian hacking group APT28 to harvest credentials from victims of intelligence value has been taken down in the US.<\/p>\n<p>The US Department of Justice (DoJ) announced on April 7, that it teamed up with the FBI to neutralize the US portion of the domain name system (DNS) hijacking network, which spanned across over 23 US states.<\/p>\n<p>The scheme was also detailed on April 7 in reports by both the UK\u2019s National Cyber Security Centre (NCSC) and Microsoft Threat Intelligence.<\/p>\n<p>In several campaigns dating back to 2024, APT28 has been exploiting vulnerabilities in small office\/home office (SOHO) routers \u2013 and especially TP-Link routers \u2013 to redirect traffic through attacker-controlled DNS servers and steal credentials from targeted organizations.<\/p>\n<p>Both the UK and US government agencies attributed APT28 to Russia\u2019s Main Intelligence Directorate of the General Staff (GRU) Military Unit 26165.<\/p>\n<p>David Metcalf, the US Attorney for the Eastern District of Pennsylvania, said: \u201cRussian military intelligence once again hijacked Americans\u2019 hardware to commandeer critical data. In the face of continued aggression by our nation-state adversaries, the US government will respond just as aggressively.\u201d<\/p>\n<h2><strong>Operation Masquerade: Hijacking the DNS Hijacking Network<\/strong><\/h2>\n<p>The US effort, dubbed \u201cOperation Masquerade,\u201d was led by FBI Boston after authorization by a court.<\/p>\n<p>As described in court documents, unsealed in the Eastern District of Pennsylvania, the FBI developed a series of commands to send to US-based routers compromised by APT28.<\/p>\n<p>These commands were designed to collect evidence regarding the threat group\u2019s activity, reset DNS settings \u2013 remove DNS resolvers installed by APT28 and force routers to obtain legitimate DNS resolvers from their internet service providers (ISPs) \u2013 and to prevent the hackers from exploiting the original means of unauthorized access.<\/p>\n<p>After testing the operation \u201cextensively\u201d on firmware and hardware for affected TP-Link routers, the DoJ confirmed it did not impact the routers\u2019 normal functionality or collect the legitimate users\u2019 content information.<\/p>\n<p>\u201cThe court-authorized steps to remediate compromised routers can be reversed by legitimate users at any time through factory resets with hardware reset buttons,\u201d said the DoJ statement.<\/p>\n<p>\u201cLegitimate users can also reverse changes by logging into web management pages and restoring desired settings (<em>e.g.<\/em>, factory default settings).\u201d<\/p>\n<p>The FBI is now working with ISPs to provide notice of the operation to users of SOHO routers covered by the court\u2019s authorization.<\/p>\n<p>Operation Masquerade involved several agencies, including the Philadelphia Field Offices and Cyber Division, the US Attorney\u2019s Office for the Eastern District of Pennsylvania and the National Security Division\u2019s National Security Cyber.<\/p>\n<p>It also benefited from the collaboration of several private-sector partners, including Lumen\u2019s Black Lotus Labs, Microsoft Threat Intelligence and the MIT Lincoln Laboratory.<\/p>\n<p>Brett Leatherman, Assistant Director of FBI\u2019s Cyber Division, commented: \u201cGRU actors compromised routers in the US and around the world, hijacking them to conduct espionage. Given the scale of this threat, sounding the alarm wasn&#8217;t enough.\u201d<\/p>\n<p>John A. Eisenberg, Assistant Attorney General for National Security, called the Russian campaign \u201ca serious and persistent threat\u201d and said his department will \u201ccontinue to use every tool at our disposal to detect such intrusions and expel hostile foreign actors from our nation\u2019s networks.\u201d<\/p>\n<h2><strong>SOHO Router Users Urged to Remediate the Threat<\/strong><\/h2>\n<p>The DoJ urged users who believe they have a compromised router to contact their local FBI field office or file a report with the FBI\u2019s Internet Crime Complaint Center (IC3).<\/p>\n<p>They are also advised to take the following steps:<\/p>\n<ul>\n<li>Replace outdated routers: check if your router is on the manufacturer\u2019s end-of-life or end-of-support list and upgrade if needed<\/li>\n<li>Update router firmware: download and install the latest firmware from the official router brand\u2019s website<\/li>\n<li>Verify DNS settings: ensure your router\u2019s DNS resolvers are legitimate<\/li>\n<li>Secure remote access: disable or restrict remote management features unless absolutely necessary<\/li>\n<li>Follow official guidance: review TP-Link\u2019s (or your router brand\u2019s) security documentation for proper setup<\/li>\n<\/ul>\n<p>\u201cWe urge all router owners to take the remediation steps outlined today, because defending our networks requires all of us,\u201d said FBI\u2019s Leatherman.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A large-scale network of internet routers compromised by Russian hacking group APT28 to harvest credentials from victims of intelligence value has been taken down in the US. The US Department of Justice (DoJ) announced on April 7, that it teamed up with the FBI to neutralize the US portion of the domain name system (DNS)<\/p>\n","protected":false},"author":2,"featured_media":5092,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5091-51e8ba28-bb20-4cbb-a0cc-45a3568f40b5-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=5091"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/5092"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=5091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=5091"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=5091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}