Security

DNS Hijacking Attacks via SOHO Routers: Microsoft Warns

3 min read

Summary

Microsoft Threat Intelligence says Forest Blizzard has been compromising vulnerable home and small-office routers to hijack DNS traffic and, in some cases, enable adversary-in-the-middle attacks against targeted connections. The campaign matters to IT teams because unmanaged SOHO devices used by remote and hybrid workers can expose cloud access and sensitive data even when corporate environments remain secure.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has disclosed a large-scale campaign in which Forest Blizzard, a threat actor linked to Russian military intelligence, compromised vulnerable SOHO routers and changed their DNS settings. For organizations with remote and hybrid workers, this is a critical reminder that unmanaged home and small-office network gear can become a blind spot that exposes Microsoft 365 access and other sensitive traffic.

What’s new

According to Microsoft Threat Intelligence, the actor has been active since at least August 2025 and has used compromised edge devices to build malicious DNS infrastructure at scale.

Key findings

  • Forest Blizzard altered router configurations to point devices to actor-controlled DNS resolvers.
  • Microsoft identified more than 200 organizations and 5,000 consumer devices affected by the malicious DNS infrastructure.
  • The campaign enabled passive DNS collection and reconnaissance across targeted networks.
  • In a subset of cases, the actor used this position to support Transport Layer Security (TLS) adversary-in-the-middle (AiTM) attacks.
  • Microsoft observed follow-on targeting of Outlook on the web domains and separate AiTM activity against government servers in Africa.

Why this matters for IT administrators

The most important takeaway is that enterprise security controls do not fully protect traffic if a user’s upstream router is compromised. A home or small-office router can silently redirect DNS lookups, giving an attacker visibility into requested domains and, in selected scenarios, the opportunity to spoof responses and attempt traffic interception.

For Microsoft 365 customers, this is especially relevant where users access Outlook on the web or other cloud services from unmanaged networks. Even if Microsoft services themselves are not compromised, users may still be exposed if they ignore invalid TLS certificate warnings or if suspicious DNS activity goes undetected.

Microsoft recommends several immediate mitigation steps:

  • Review risks tied to remote users’ home and small-office networking equipment.
  • Enforce trusted DNS resolution where possible, including Zero Trust DNS (ZTDNS) controls on Windows endpoints.
  • Enable network protection and web protection in Microsoft Defender for Endpoint.
  • Block known malicious domains and retain detailed DNS logs for monitoring and investigation.
  • Audit router and edge device configurations, especially DNS and DHCP settings.
  • Ensure vulnerable SOHO devices are patched, securely configured, or replaced if no longer supported.
  • Train users not to bypass TLS certificate warnings.

Bottom line

This campaign shows how attackers can exploit weakly managed edge devices to gain visibility into higher-value enterprise targets. Security teams should expand their threat model beyond corporate infrastructure and account for home-office networking equipment as part of remote access and Microsoft 365 protection strategies.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

DNS hijackingSOHO routersMicrosoft DefenderAiTMForest Blizzard

Related Posts

Security

Medusa Ransomware: Storm-1175 Targets Web Assets

Microsoft Threat Intelligence warns that Storm-1175 is rapidly exploiting vulnerable internet-facing systems to deploy Medusa ransomware, sometimes within 24 hours of initial access. The group’s focus on newly disclosed flaws, web shells, RMM tools, and fast lateral movement makes patch speed, exposure management, and post-compromise detection critical for defenders.

Security

Device Code Phishing: AI-Driven Campaign Escalates

Microsoft Defender Security Research detailed a large-scale phishing campaign that abuses the OAuth device code flow using AI-generated lures, dynamic code generation, and automated backend infrastructure. The campaign raises the risk for organizations because it improves attacker success rates, bypasses traditional detection patterns, and enables token theft, inbox rule persistence, and Microsoft Graph reconnaissance.

Security

AI Cyberattacks Accelerate Threats Across Attack Chain

Microsoft warns that threat actors are now embedding AI across the full cyberattack lifecycle, from reconnaissance and phishing to malware development and post-compromise operations. For defenders, this means faster, more precise attacks, higher phishing success rates, and a growing need to strengthen identity, MFA protections, and visibility into AI-driven attack surfaces.

Security

PHP Webshells on Linux: Cookie-Controlled Evasion

Microsoft warns that threat actors are using HTTP cookies to control PHP webshells on Linux hosting environments, helping malicious code stay dormant unless specific cookie values are present. The technique reduces visibility in routine logs, supports persistence through cron jobs, and highlights the need for stronger monitoring, web protection, and endpoint detection on hosted Linux workloads.

Security

Axios npm Supply Chain Compromise: Mitigation Guide

Microsoft warned that malicious Axios npm versions 1.14.1 and 0.30.4 were used in a supply chain attack attributed to Sapphire Sleet. Organizations using the affected packages should immediately rotate secrets, downgrade to safe versions, and review developer endpoints and CI/CD systems for compromise.

Security

Critical Infrastructure Security Readiness in 2026

Microsoft says the threat model for critical infrastructure has shifted from opportunistic attacks to persistent, identity-driven access designed for future disruption. For IT and security leaders, the message is clear: reduce exposure, harden identity, and validate operational readiness now as regulations and nation-state activity intensify.