APT28 DNS Hijacking: How Exploited Routers Enable Credential Theft

NCSC Warns: APT28 Exploits Routers for DNS Hijacking and Credential Theft

APT28 DNS Hijacking Operations: What Happened?

APT28 DNS hijacking is a sophisticated cyber threat that has recently been highlighted by the UK National Cyber Security Centre (NCSC). Within the first half of 2024, Russian-linked threat actor APT28 exploited vulnerable routers to hijack DNS settings. This attack technique enables adversary-in-the-middle operations, allowing the attacker to redirect network traffic through malicious DNS servers and steal credentials from targeted organisations.

Understanding DNS and DNS Hijacking

The Domain Name System (DNS) is a fundamental protocol that translates human-friendly domain names into IP addresses. DNS hijacking occurs when threat actors manipulate DNS records or settings to redirect users to malicious websites, enabling phishing or theft of sensitive login information.

  • DNS protocol resolves domain names to IP addresses
  • DNS hijacking manipulates DNS responses to redirect clients
  • Attackers can host phishing pages or steal authentication credentials

APT28’s Exploitation Methods

APT28, also known as Fancy Bear or Forest Blizzard, is a Russian state-sponsored group well-known for targeting Western organisations. In this campaign, APT28 exploited routers by overwriting DHCP/DNS settings. Compromised routers then propagated attacker-controlled DNS server addresses to downstream devices, including laptops and phones. The attackers filtered DNS traffic to identify users of intelligence interest, harvesting passwords, OAuth tokens and other authentication credentials from web and email services.

Why APT28 DNS Hijacking Matters for Organisations

Risks of Adversary-in-the-Middle Attacks

APT28 DNS hijacking enables adversary-in-the-middle (AitM) attacks. This means network traffic, including sensitive login details, passes through attacker-controlled infrastructure. The risk is not limited to credential theft; it can also lead to data manipulation and further compromise of organisational systems.

  • Credential theft (passwords, tokens)
  • Data manipulation and potential sabotage
  • Broader compromise through lateral movement

Scope and Opportunistic Nature

NCSC reports that APT28’s operations have targeted a wide pool of organisations, including small office and home office (SOHO) environments. The campaign is opportunistic: attackers compromise many devices, then focus on those yielding valuable intelligence, such as government or corporate credentials.

Potential Impact on Business Operations

Successful DNS hijacking can lead to:

  • Disruption of email and web services
  • Loss of sensitive data or intellectual property
  • Damage to reputation and trust
  • Regulatory consequences for data breaches

How Organisations Should Respond to DNS Hijacking Threats

Mitigating Router Vulnerabilities

Routers are a crucial security boundary. APT28 exploited publicly known vulnerabilities, so regular patching and firmware updates are essential. Organisations should review their inventory to identify and secure all network devices, especially SOHO routers.

  • Apply security patches and firmware updates promptly
  • Replace unsupported or end-of-life routers
  • Disable remote management interfaces where possible

Securing DNS Infrastructure

Organisations should monitor DNS settings and traffic for signs of compromise. Implementing secure DNS protocols, such as DNSSEC or encrypted DNS (DoH/DoT), can help reduce risk. Restrict changes to DHCP/DNS settings and require authentication for administrative access.

  • Monitor DNS server addresses configured on devices
  • Regularly audit router and firewall logs
  • Use trusted DNS resolvers and enable DNSSEC

Credential Protection and Incident Response

Credential theft is a primary goal of DNS hijacking. Organisations should enforce strong authentication, such as multi-factor authentication (MFA), and educate staff about phishing risks. If compromise is suspected, reset affected credentials immediately and review access logs for unusual activity.

  • Adopt MFA for critical accounts
  • Educate staff on phishing and adversary-in-the-middle risks
  • Prepare and test incident response plans for credential compromise

Key Actions and Ongoing Vigilance

Summary Checklist for Protection

  • Patch and update all routers
  • Audit and lock down DNS settings
  • Monitor for suspicious DNS traffic
  • Enforce MFA across all services
  • Educate employees about DNS hijacking

Collaboration and Reporting

Sharing threat intelligence and reporting incidents to authorities such as the NCSC can help strengthen collective defences. Cybersecurity is a shared responsibility: proactive communication between IT, security and executive teams is vital for timely response.

In summary, APT28 DNS hijacking is a clear reminder of the importance of network device security and DNS monitoring. By adopting robust practices, organisations can reduce risk and protect sensitive data from adversary-in-the-middle threats.

Originally reported by National Cyber Security Centre.

Share this bulletin

About the Author

Leonie Witte Cyber Security Manager at CyPro

Leonie Witte

Cyber Security Manager

Leonie Witte

Joining CyPro from Capgemini, Leonie brings a strong blend of technical insight and consulting expertise to her role as a Cyber Security Manager. Her work spans three core areas: governance and compliance (including ISO27001), advanced security operations (such as privileged user monitoring and security tooling optimisation) and AI-driven security solutions.

Alongside her technical capability, Leonie is passionate about upskilling teams and elevating security maturity, helping organisations embed secure behaviours and build long-lasting capability. Deeply committed to social value, she regularly gives back to the community by working with charities to make digital skills accessible to a variety of communities.

Known for her bubbly, open-minded approach and effective people leadership, Leonie is a natural collaborator who creates momentum, inspires teams, and delivers meaningful security outcomes.

View Profile
Back to Bulletins
Category
Cyber Attacks
Published
Apr 16 - 2026
Post Tags
Cypro firewall showing robust network security
Secure your business.
Elevate your security, accelerate your growth. We take care of cyber security for high-growth companies, at every stage of their journey.
Get in touch
CyPro Cookie Consent

Hmmm cookies...

Our delicious cookies make your experience smooth and secure.

Privacy PolicyOkay, got it!

We use cookies to enhance your experience, analyse site traffic, and for marketing purposes. For more information on how we handle your personal data, please see our Privacy Policy.

Schedule a Call