FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users
Cybersecurity NewsArchived Apr 08, 2026✓ Full text saved
The U.S. Justice Department and the FBI have successfully dismantled a massive cyberespionage network in a court-authorized takedown dubbed “Operation Masquerade.” Announced on April 7, 2026, the technical operation neutralized thousands of compromised small office/home office (SOHO) routers that were hijacked by Russian military intelligence to spy on global targets. The disruption targeted a hacking […] The post FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users app
Full text archived locally
✦ AI Summary· Claude Sonnet
Home Cyber Attack News FBI Disrupts Russian Router Hijacking Operation Compromised Thousands of Users
The U.S. Justice Department and the FBI have successfully dismantled a massive cyberespionage network in a court-authorized takedown dubbed “Operation Masquerade.”
Announced on April 7, 2026, the technical operation neutralized thousands of compromised small office/home office (SOHO) routers that were hijacked by Russian military intelligence to spy on global targets.
The disruption targeted a hacking unit within Russia’s Main Intelligence Directorate (GRU), widely tracked by cybersecurity researchers as APT28, Fancy Bear, Forest Blizzard, and Sednit.
Since at least 2024, these state-sponsored hackers have actively exploited known security vulnerabilities to steal credentials for thousands of TP-Link routers worldwide.
Russian Router Hijacking Operation
Once the GRU actors gained unauthorized access to a router, they manipulated its Domain Name System (DNS) settings. This effectively redirected the victim’s internet traffic to malicious, attacker-controlled DNS resolvers.
While the initial router compromises were indiscriminate, the hackers used an automated filtering system to identify high-value targets in the military, government, and critical infrastructure sectors.
For these selected targets, the malicious DNS resolvers served fraudulent records that mimicked legitimate online services, such as Microsoft Outlook Web Access.
This allowed the GRU to execute Actor-in-the-Middle (AitM) attacks against encrypted network traffic.
By routing traffic through their servers, the attackers successfully harvested unencrypted passwords, authentication tokens, emails, and other sensitive data from devices connected to the compromised networks.
To stop the espionage campaign, the FBI developed and deployed a series of remote commands to the compromised routers across 23 states.
These commands gathered vital evidence, purged the malicious GRU DNS resolvers, and restored legitimate ISP default settings.
The commands also locked out the attackers by patching the original means of unauthorized access.
The government extensively tested these actions alongside MIT Lincoln Laboratory to ensure they did not break normal router functionality or access private user data.
The disruption effort was a collaborative success involving the FBI’s Boston and Philadelphia Field Offices, with critical threat intelligence provided by Microsoft and Black Lotus Labs at Lumen.
Recommended Remediation Steps
While the FBI has secured the compromised devices, the agency urges all SOHO router owners to take proactive steps to defend their networks:
Replace any End-of-Life (EoL) or unsupported routers immediately.
Upgrade the hardware to the latest available firmware from the manufacturer.
Verify the authenticity of the DNS resolvers listed in your router’s configuration settings.
Review and update firewall rules to prevent the public exposure of remote management services.
The FBI is currently working directly with Internet Service Providers to notify impacted users.
If you believe your router was compromised, you are encouraged to check the official TP-Link download center for proper configuration guidelines and file a report with the FBI’s Internet Crime Complaint Center (IC3).
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
RELATED ARTICLESMORE FROM AUTHOR
Cyber Security News
Claude Finds 13-Year-Old 0-Day RCE Vulnerability in Apache ActiveMQ in 10 Minutes
Cyber Security News
CUPS Vulnerability Chain Enables Remote Attacker to Execute Malicious Code as Root User
Cyber Security News
Fiber Optic Cables Turned Into Hidden Microphones to Secretly Spy on Your Conversations
Top 10
Top 10 Best User Access Management Tools in 2026
April 4, 2026
Top 10 Best VPN For Chrome in 2026
April 4, 2026
20 Best Application Performance Monitoring Tools in 2026
April 3, 2026
Top 10 Best VPN For Linux In 2026
April 3, 2026
10 Best VPN For Privacy In 2026
April 2, 2026