At the height of its operation in December 2025, a network of compromised internet routers spanned more than 18,000 networks — not through zero-day exploits or advanced malware, but by exploiting known, unpatched flaws in aging SOHO hardware.
Key Takeaways
- 18,000 routers were compromised at peak activity, mostly end-of-life Mikrotik and TP-Link devices.
- Forest Blizzard, also known as APT28 and Fancy Bear, redirected DNS settings to intercept OAuth authentication tokens from Microsoft Office users.
- No malware was installed on the routers — attackers simply reconfigured DNS to point to attacker-controlled servers.
- Microsoft confirmed over 200 organizations and 5,000 consumer devices were affected.
- The attack exploited the trust users place in their local network — a blind spot in enterprise and home security.
How a Router Becomes a Spy
It starts with a router that hasn’t been updated in years. Maybe it’s a Mikrotik RB750 sitting in a government ministry’s back office. Maybe it’s a TP-Link TL-WR841N in a contractor’s home office. It’s still working. No one touches it. No one resets it. No one logs in.
And that’s exactly what the hackers counted on.
According to researchers at Black Lotus Labs, a security division of Lumen Technologies, Forest Blizzard — a threat actor tied directly to Russia’s GRU — didn’t need to deploy custom code or exploit unknown vulnerabilities. They used publicly documented flaws in outdated firmware to log in and change a single setting: the DNS server address.
That change was small. The router kept working. Users kept browsing. But now, every DNS request — “Where is login.microsoftonline.com?” — went through a server controlled by Russian military intelligence.
“The attackers didn’t need to install malware,” said Ryan English, a security engineer at Black Lotus Labs. “They just changed the DNS settings. That was enough.”
The Silent Token Heist
Once the DNS was under their control, the attackers didn’t redirect users to fake login pages. That’s noisy. That’s detectable. Instead, they waited — patiently — for users to log in legitimately to Microsoft Office and other cloud services.
After login, the service issues an OAuth token. That token is proof of identity — like a digital passport stamp — and it’s sent with every request to access email, files, calendars. Usually, it’s transmitted over HTTPS. Encrypted. Secure.
But because the DNS was compromised, the attackers could perform a man-in-the-middle attack at the network level. They could decrypt, inspect, and copy those tokens — not by breaking encryption, but by exploiting the way routers handle traffic between devices and the broader internet.
They didn’t need to intercept passwords. They didn’t need phishing emails or social engineering. They had the tokens — the keys to the kingdom — and they could use them to access corporate email, internal documents, and sensitive correspondence from the outside, appearing as legitimate users.
Why This Attack Works So Well
Enterprises spend millions on endpoint detection, email filtering, and identity monitoring. But they rarely audit the firmware on a $100 router in a regional office. Even less so in contractors’ homes.
These devices are invisible in most security models. They’re not managed by IT. They’re not monitored. They’re not patched. And once they’re compromised, they become silent, persistent proxies for surveillance.
- Attackers controlled DNS for months in some cases.
- They harvested tokens without triggering alerts because traffic remained encrypted and appeared to originate from valid internal IPs.
- OAuth tokens, once stolen, can be used from any location — no need to stay on the victim network.
- Many of the routers targeted were no longer receiving security updates — end-of-life hardware still in active use.
APT28’s Long Game
Forest Blizzard isn’t some new hacker collective. It’s APT28. It’s Fancy Bear. It’s the same GRU unit that breached the Democratic National Committee in 2016, leaked emails during the U.S. presidential election, and has been linked to cyber operations across NATO countries for over a decade.
What’s striking isn’t the sophistication — it’s the patience, the scalability, and the sheer banality of the method. No AI. No zero-days. Just router defaults, poor patch hygiene, and the assumption that “if it’s not broken, don’t fix it.”
And it worked. At peak activity in December 2025, the campaign had ensnared more than 18,000 routers. The majority were in government and diplomatic sectors — including ministries of foreign affairs and law enforcement agencies — but also third-party email providers and private sector organizations.
Microsoft, in a blog post published April 27, 2026, said it detected the abuse of tokens across more than 200 organizations and 5,000 consumer devices. The company didn’t name the victims, but the pattern of targeting suggests intelligence gathering, not financial theft.
“The attackers didn’t need to install malware. They just changed the DNS settings. That was enough.” — Ryan English, Black Lotus Labs
Why the Cloud Isn’t the Answer
For years, we’ve been told that moving to the cloud improves security. Centralized identity. Unified logging. Zero Trust. But this attack exposes a fatal flaw: the front door to the cloud often runs through a consumer-grade router in a home office.
No amount of MFA or conditional access policies can stop a stolen OAuth token if it’s already been exfiltrated at the network level. Once the token is in the attacker’s hands, it’s indistinguishable from a legitimate session — especially if it hasn’t expired.
And let’s be honest: most organizations don’t enforce token lifetime policies aggressively. Why? Because it breaks user experience. Employees hate being logged out every hour. So tokens live longer. Which means stolen tokens have more time to do damage.
The irony is sharp: companies invest in securing their cloud environments, then hand over access to networks protected by routers that haven’t seen a patch since 2018.
Industry Response and Competitor Actions
Other major tech companies have also been affected by similar attacks. Google, for instance, has been working to improve the security of its own cloud services, including the introduction of more robust token validation and IP blocking. Amazon Web Services has also taken steps to enhance its security features, such as implementing more frequent token rotation and providing users with more detailed logs of account activity.
Meanwhile, cybersecurity firms like Palo Alto Networks and Check Point have been developing new solutions to protect against these types of attacks. These include advanced threat detection systems and more secure DNS services. However, the sheer scale of the problem means that a comprehensive solution will require a coordinated effort from the entire industry.
Some companies, like Cisco Systems, have been working to improve the security of their own routers and networking equipment. This includes implementing more robust security protocols and providing users with more regular software updates. However, the fact remains that many organizations are still using outdated and vulnerable hardware, which will continue to pose a significant risk until it is replaced or upgraded.
The Technical Dimensions of the Attack
From a technical perspective, the attack highlights the importance of proper DNS configuration and management. The use of DNS tunneling and other techniques to bypass traditional security controls is a growing concern, and one that requires a more nuanced approach to security.
One key issue is the lack of visibility and control over DNS traffic. Many organizations rely on third-party DNS services, which can make it difficult to monitor and manage DNS requests. This lack of visibility can make it easier for attackers to hide their activities and avoid detection.
Another issue is the use of outdated and vulnerable DNS protocols. Many organizations are still using older protocols like DNS over UDP, which can be vulnerable to spoofing and other attacks. The use of more secure protocols like DNS over TLS can help to mitigate these risks, but adoption has been slow.
The Bigger Picture
The attack on Microsoft Office users is just one example of a larger trend. As more and more organizations move to the cloud, the risk of similar attacks will only continue to grow. The use of stolen OAuth tokens and other credentials will become an increasingly popular tactic for attackers, who will seek to exploit the trust that users place in their cloud services.
It’s not just about the cloud, though. The attack also highlights the importance of proper security hygiene and risk management. Organizations need to take a more comprehensive approach to security, one that includes regular audits and assessments of their networks and systems.
This includes implementing more robust security controls, such as multi-factor authentication and conditional access policies. It also means providing users with more education and training on security best practices, and ensuring that they understand the risks associated with using cloud services.
What This Means For You
If you’re a developer building cloud-connected applications, stop assuming the network layer is trustworthy. Validate not just identity, but context — IP reputation, device posture, behavioral signals. Shorten token lifetimes. Force refreshes. Treat every token as potentially compromised.
If you’re an engineering lead or CTO, audit your remote access policies. Are employees using personal routers to access corporate systems? Are those routers even capable of receiving updates? Demand hardware standards for remote work — not just software. This isn’t just an IT issue. It’s an architectural risk.
And if you’re still running a TP-Link or Mikrotik router from five years ago, reset it. Update it. Or replace it. Because right now, it might be working exactly as intended — for someone in Moscow.
Forest Blizzard didn’t need advanced tools. They just needed time, patience, and our complacency about the devices we ignore. The next breach might not come from a phishing email or a leaked API key. It might come from the router under your desk, quietly sending your login tokens to a server in Russia — while displaying perfect internet connectivity.
Sources: Krebs on Security, Microsoft Security Blog


