Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/CyberSecurity News/FBI Disrupts Russian Router Hijacking Affecting Thousands
CyberSecurity News

FBI Disrupts Russian Router Hijacking Affecting Thousands

Through a court-authorized takedown dubbed ‘Operation Masquerade,’ the U.S. Justice Department and the FBI have successfully dismantled a massive cyberespionage network. Announced on...

Jennifer sherman
Jennifer sherman
April 8, 2026 2 Min Read
3 0

Through a court-authorized takedown dubbed ‘Operation Masquerade,’ the U.S. Justice Department and the FBI have successfully dismantled a massive cyberespionage network.

Announced on April 7, 2026, the technical operation neutralized thousands of compromised small office/home office (SOHO) routers that were hijacked by Russian military intelligence to spy on global targets.

The disruption targeted a hacking unit within Russia’s Main Intelligence Directorate (GRU), widely tracked by cybersecurity researchers as APT28, Fancy Bear, Forest Blizzard, and Sednit.

Since at least 2024, these state-sponsored hackers have actively exploited known security vulnerabilities to steal credentials for thousands of TP-Link routers worldwide.

Russian Router Hijacking Operation

Once the GRU actors gained unauthorized access to a router, they manipulated its Domain Name System (DNS) settings. This effectively redirected the victim’s internet traffic to malicious, attacker-controlled DNS resolvers.

While the initial router compromises were indiscriminate, the hackers used an automated filtering system to identify high-value targets in the military, government, and critical infrastructure sectors.

For these selected targets, the malicious DNS resolvers served fraudulent records that mimicked legitimate online services, such as Microsoft Outlook Web Access.

This allowed the GRU to execute Actor-in-the-Middle (AitM) attacks against encrypted network traffic.

By routing traffic through their servers, the attackers successfully harvested unencrypted passwords, authentication tokens, emails, and other sensitive data from devices connected to the compromised networks.

To stop the espionage campaign, the FBI developed and deployed a series of remote commands to the compromised routers across 23 states.

These commands gathered vital evidence, purged the malicious GRU DNS resolvers, and restored legitimate ISP default settings.

The commands also locked out the attackers by patching the original means of unauthorized access.

The government extensively tested these actions alongside MIT Lincoln Laboratory to ensure they did not break normal router functionality or access private user data.

The disruption effort was a collaborative success involving the FBI’s Boston and Philadelphia Field Offices, with critical threat intelligence provided by Microsoft and Black Lotus Labs at Lumen.

Recommended Remediation Steps

While the FBI has secured the compromised devices, the agency urges all SOHO router owners to take proactive steps to defend their networks:

  • Replace any End-of-Life (EoL) or unsupported routers immediately.
  • Upgrade the hardware to the latest available firmware from the manufacturer.
  • Verify the authenticity of the DNS resolvers listed in your router’s configuration settings.
  • Review and update firewall rules to prevent the public exposure of remote management services.

The FBI is currently working directly with Internet Service Providers to notify impacted users.

If you believe your router was compromised, you are encouraged to check the official TP-Link download center for proper configuration guidelines and file a report with the FBI’s Internet Crime Complaint Center (IC3).

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitHackerPatchSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

OpenSSL Flaws Expose Sensitive Data via RSA K Multiple Vulnerabilities

Next Post

Indian Bank Warns Users of Fake LPG Payment and KYC Update Scams

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us