BotBeat
...
← Back

> ▌

MicrosoftMicrosoft
POLICY & REGULATIONMicrosoft2026-04-07

Russian Military Intelligence Uses Router Hacks to Steal Microsoft Office Tokens from 18,000 Networks

Key Takeaways

  • ▸Russian GRU-linked APT28 (Forest Blizzard) compromised 18,000+ routers by exploiting DNS vulnerabilities to intercept Microsoft Office authentication tokens
  • ▸Attack targeted over 200 organizations and 5,000 consumer devices, primarily government agencies and email providers, without deploying any malware
  • ▸Hackers bypassed multi-factor authentication by intercepting OAuth tokens after successful login, gaining direct account access without credential phishing
Source:
Hacker Newshttps://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/↗

Summary

Russian military intelligence hackers linked to the GRU's APT28 (Forest Blizzard) have been conducting a large-scale espionage campaign exploiting known vulnerabilities in older routers to steal authentication tokens from Microsoft Office users. The attackers compromised more than 18,000 Internet routers—primarily outdated Mikrotik and TP-Link devices—by modifying their DNS settings to redirect traffic through attacker-controlled servers. Microsoft identified over 200 organizations and 5,000 consumer devices affected by the campaign, which peaked in December 2025.

Instead of deploying malware, the Russian hackers used a sophisticated but low-tech approach: they reconfigured the routers' DNS settings and intercepted OAuth authentication tokens transmitted after users logged in with multi-factor authentication. This allowed attackers to gain direct access to victim accounts without phishing credentials or one-time codes. The campaign primarily targeted government agencies including foreign ministries, law enforcement, and third-party email providers. Security researchers at Black Lotus Labs noted the attackers exploited end-of-life routers that were largely unpatched and unsupported, highlighting the risks posed by legacy devices on enterprise networks.

  • Vulnerable SOHO routers from Mikrotik and TP-Link were exploited, underscoring risks of unpatched legacy devices in enterprise and government networks

Editorial Opinion

This campaign exemplifies a critical blind spot in cybersecurity: while organizations invest heavily in endpoint protection and advanced threat detection, legacy infrastructure like older routers remain dangerously neglected. The attackers' elegant simplicity—using DNS hijacking rather than malware—demonstrates that sophisticated state-sponsored hacking doesn't always require complex tools; it requires exploiting organizational gaps in asset management and patch discipline. The fact that this attack bypassed multi-factor authentication by intercepting tokens post-authentication should prompt an urgent reassessment of network security assumptions and the necessity of retiring or rigorously securing end-of-life devices.

CybersecurityGovernment & DefensePrivacy & Data

More from Microsoft

MicrosoftMicrosoft
UPDATE

Microsoft Aspire 13.2 Introduces Agent-Friendly Features for Autonomous Development Workflows

2026-04-07
MicrosoftMicrosoft
UPDATE

Microsoft Copilot CLI Introduces Dual-Model Critique System for Enhanced Code Generation

2026-04-07
MicrosoftMicrosoft
UPDATE

Microsoft's New Copilot App for Windows 11 Is Built on Edge Browser Foundation

2026-04-07

Comments

Suggested

IrreducibleIrreducible
RESEARCH

Irreducible Achieves 4x GPU Speedup for Binius Binary Field Arithmetic Using Bit-Slicing

2026-04-07
Open Source CommunityOpen Source Community
INDUSTRY REPORT

Linux Kernel to Drop Intel 486 Support in Version 7.1, Ending 35-Year Hardware Compatibility Era

2026-04-07
AnthropicAnthropic
PRODUCT LAUNCH

Anthropic to Preview 'Mythos' Model Designed to Counter AI Cybersecurity Threats

2026-04-07
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us