Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 13 Apr 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromised insecure MikroTik and TP-Link routers and modified their settings to turn them into malicious infrastructure under their control as part of a cyber espionage campaign since at least May 2025.
The large-scale exploitation campaign has been codenamed FrostArmada by Lumen's Black Lotus Labs, with Microsoft describing it as an effort to exploit vulnerable home and small office (SOHO) internet devices to hijack DNS traffic and enable passive collection of network data.
"Their technique modified DNS settings on compromised routers to hijack local network traffic to capture and exfiltrate authentication credentials," Black Lotus Labs said in a report shared with The Hacker News. More here
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said. More...
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns … More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
The threat group's shift to speedy attacks on AWS, Azure, and SaaS instances shows organizations need to respond quickly… More...
Object First's Cusimano on Why Backup Storage Is Now a Prime Ransomware Target More...
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said. More...
The Russia-linked threat actor known as APT28 (aka Forest Blizzard) has been linked to a new campaign that has compromis… More...
Microsoft says the financially motivated cybercrime group has exploited N-day and zero-day vulnerabilities in campaigns … More...
Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer. More...
ImmuniWeb is hosting an interactive webinar “Web, Mobile & Cloud Penetration Testing in 2026: Best Practices” for all ou… More...