Tropic Trooper, a notorious China-linked APT, has evolved its tactics to compromise home routers and target individuals in Japan, Taiwan, and South Korea. Investigators reveal a wave of attacks involving DNS hijacking, open source malware, and phishing campaigns, signaling a dangerous shift in cyber espionage.
Russia’s APT28, in the FrostArmada campaign, compromised thousands of routers worldwide to steal Microsoft credentials—without using malware. Learn how the attack worked, who was targeted, and what it means for the future of network security.
Russian military hackers are hijacking home routers worldwide, exploiting weak passwords and outdated firmware to steal passwords and spy on sensitive data. Discover how your forgotten devices could be fueling a global cyberwar—and what you can do to stop it.
A Russian military-linked group, Forest Blizzard, has weaponized over 5,000 home and office routers for global surveillance. Microsoft reveals how these attacks compromise remote workers, intercept emails, and threaten organizational security worldwide.
U.S. law enforcement and global tech firms have dismantled a sprawling Russian cyber-espionage operation that hijacked home and office routers in over 120 countries. Here’s how the attackers exploited DNS and router vulnerabilities—and how the takedown unfolded.
Russian state-backed hackers have turned vulnerable home routers into powerful espionage tools, compromising over 5,000 devices and targeting hundreds of organizations in a sweeping DNS hijacking attack. Here’s how the campaign unfolded—and why your home network could be the next front line.
A dramatic FBI-led operation has exposed and halted a Russian military hacking campaign that hijacked thousands of home and office routers worldwide. Discover how the plot worked, who was targeted, and why millions of devices remain at risk.
Russian military-linked hackers are turning home and small office routers into espionage tools, hijacking DNS traffic to spy on organizations around the globe. Discover how these attacks work, who is at risk, and the urgent steps security experts recommend.
Global attackers exploited outdated home routers, rerouting web traffic through Aeza International—a US-sanctioned Russian bulletproof host—using DNS hijacking. Victims’ browsing was quietly redirected and monetized via malicious ad networks, exposing the dangers of neglecting router security.
A clandestine DNS hijacking network is silently seizing control of vulnerable routers, redirecting traffic and undermining internet trust. Discover how the Shadow DNS operation works and what it means for users and organizations.