DNS Hijacks Used to Steal Microsoft 365 Logins
On April 7, 2026 , international law enforcement agencies—working with Microsoft and private-sector researchers— disrupted a large-scale DNS hijacking operation that was actively stealing Microsoft 365 credentials by manipulating internet routers worldwide. [bleepingcomputer.com] The campaign, tracked as FrostArmada , was linked to APT28 (also known as Fancy Bear , Forest Blizzard , or STRONTIUM ), a Russia-backed cyber‑espionage group associated with GRU military unit 26165. [bleepingcomputer.com] , [ncsc.gov.uk] Authorities involved in the takedown included: The FBI The U.S. Department of Justice The Polish government Microsoft and Lumen’s Black Lotus Labs Together, they dismantled key attacker-controlled infrastructure used to redirect traffic and steal credentials. [bleepingcomputer.com] How the attack worked (in plain English) This was not phishing email spam . Instead, attackers compromised routers at the network edge , mainly: MikroTik TP‑Link Some Fortinet and Nethesis fi...