Anavem
Languagefr
Consumer routers with warning lights in dark server room environment

Law Enforcement Disrupts APT28 Router Hijacking Campaign

International authorities dismantled FrostArmada, an APT28 operation that compromised MikroTik and TP-Link routers to steal Microsoft credentials.

7 April 2026, 17:51 5 min read

Last updated 7 April 2026, 22:37

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORMikroTik, TP-Link
AFFECTEDMikroTik RouterOS versions pri...
CATEGORYCyber Attacks

Key Takeaways

APT28 FrostArmada Campaign Exploited Router Vulnerabilities

An international law enforcement operation successfully disrupted FrostArmada, a sophisticated cyber espionage campaign orchestrated by APT28, Russia's military intelligence unit also known as Fancy Bear. The operation, announced on April 7, 2026, targeted a network of compromised consumer routers that the threat group had weaponized to intercept and steal Microsoft account credentials from unsuspecting users.

The FrostArmada campaign represented a significant evolution in APT28's tactics, moving beyond traditional phishing and malware delivery to infrastructure-level attacks. The Russian hackers systematically compromised MikroTik and TP-Link routers across multiple countries, transforming these devices into covert credential harvesting platforms. By hijacking local network traffic, the attackers could intercept authentication tokens and login credentials as users accessed Microsoft services including Office 365, Outlook, and Azure platforms.

According to security researchers, the campaign exploited known vulnerabilities in router firmware that many users had failed to patch. The attackers leveraged these security gaps to install persistent backdoors, allowing them to monitor network traffic and extract valuable authentication data without detection. The operation's scope extended across residential and small business networks, where security monitoring is typically minimal.

The disruption effort involved coordinated action from multiple international agencies working alongside private cybersecurity firms. Law enforcement authorities executed simultaneous takedown operations across different jurisdictions, severing the command and control infrastructure that APT28 used to manage the compromised router network. This collaborative approach proved essential given the global distribution of the affected devices and the cross-border nature of the threat.

Global Router Networks and Microsoft Users Targeted

The FrostArmada campaign primarily affected users of MikroTik RouterOS and TP-Link firmware versions that contained unpatched security vulnerabilities. MikroTik routers running RouterOS versions prior to 6.49.7 and 7.6 were particularly vulnerable, as were TP-Link devices with firmware dating back to 2023 that hadn't received critical security updates. The attack surface included both residential users and small-to-medium businesses that relied on these popular router brands for internet connectivity.

Microsoft account holders represented the primary target demographic, with the stolen credentials potentially affecting millions of users across Office 365, Microsoft 365, Azure Active Directory, and Outlook services. The intercepted authentication tokens could grant attackers persistent access to corporate email systems, cloud storage, and collaborative platforms. Organizations using Microsoft's ecosystem for business operations faced heightened risks of data exfiltration, email compromise, and lateral movement within their networks.

Geographically, the campaign showed particular concentration in North America and Europe, where MikroTik and TP-Link devices maintain significant market share among consumer and small business segments. The CISA Known Exploited Vulnerabilities catalog had previously flagged several of the router vulnerabilities exploited in this campaign, but adoption of security patches remained inconsistent across the affected user base.

Router Compromise and Credential Harvesting Techniques

The APT28 operators employed a multi-stage attack methodology that began with scanning for vulnerable router devices exposed to the internet. Once identified, the attackers exploited known Common Vulnerabilities and Exposures (CVEs) in MikroTik and TP-Link firmware to gain initial access. The compromise process involved uploading malicious scripts that modified router configurations to redirect specific network traffic through attacker-controlled proxy servers.

The credential harvesting mechanism operated by intercepting HTTPS traffic destined for Microsoft authentication endpoints. The compromised routers performed man-in-the-middle attacks, capturing OAuth tokens, session cookies, and login credentials as they passed through the device. This technique proved particularly effective because it operated at the network infrastructure level, bypassing many endpoint security solutions that users might have installed on their computers or mobile devices.

To defend against similar attacks, network administrators should immediately update MikroTik RouterOS to version 6.49.7 or later for the v6 branch, or version 7.6 or later for the v7 branch. TP-Link users must install the latest firmware releases available through the manufacturer's support portal. Additionally, organizations should implement network segmentation, deploy DNS filtering to block known malicious domains, and monitor for unusual authentication patterns in Microsoft 365 logs. Users should also enable multi-factor authentication on all Microsoft accounts and regularly review active sessions for unauthorized access attempts.

Frequently Asked Questions

How do I check if my router was compromised by APT28?+
Check your router's firmware version against the latest releases from MikroTik or TP-Link. Look for unusual network activity, unexpected configuration changes, or unfamiliar devices in your router's admin panel. Monitor your Microsoft account for suspicious login attempts or active sessions from unknown locations.
What router firmware versions are vulnerable to FrostArmada?+
MikroTik RouterOS versions prior to 6.49.7 and 7.6 are vulnerable. TP-Link devices with firmware from 2023 that haven't received recent security updates are also at risk. Users should immediately update to the latest firmware versions available from their router manufacturer.
Can APT28 still access my Microsoft account after the disruption?+
If your credentials were stolen, attackers may retain access until you change your password and revoke active sessions. Log into your Microsoft account security settings, review recent activity, sign out all sessions, enable multi-factor authentication, and change your password immediately.

Discussion

Share your thoughts and insights

Sign in to join the discussion