Cybersecurity

How Russian Hackers Exploited Routers to Steal OAuth Tokens: A Step-by-Step Breakdown

2026-04-30 20:01:34

Introduction

In a sophisticated cyber espionage campaign, Russian military intelligence hackers—tracked as Forest Blizzard (also APT28 or Fancy Bear)—used compromised routers to silently harvest authentication tokens from Microsoft 365 (formerly Office 365) users. Instead of deploying malware on the targeted routers, they exploited known vulnerabilities to alter DNS settings, redirecting users to malicious servers that intercepted OAuth tokens. This guide breaks down the attack into clear, numbered steps, explaining the prerequisites, execution, and defensive measures. Understanding this method helps organizations and individuals recognize and mitigate similar threats.

russian hackers exploited
Image via Flickr

What You Need to Understand This Attack

Step-by-Step Account of the Attack

Step 1: Identify and Access Vulnerable Routers

The hackers scanned the internet for routers running old firmware with known, publicly disclosed vulnerabilities. They focused on two vendor families: MikroTik and TP-Link, particularly models that were end-of-life or far behind on security updates. Using automated tools, they attempted to exploit default credentials or unpatched remote code execution flaws (e.g., CVE-2018-14847 for MikroTik). Successful exploitation gave them administrative control over the router without installing any malware—they could change configuration settings directly.

Step 2: Modify Router’s DNS Settings

Once inside the router’s web interface or command-line system, the attackers altered the DNS server settings. They replaced the legitimate DNS servers (e.g., from the ISP) with IP addresses pointing to their own virtual private servers. This change was made in the router’s DHCP configuration so that every device on the local network would automatically receive the rogue DNS server when requesting dynamic IP addresses.

Step 3: Configure Malicious DNS Servers

On their VPS, the hackers set up DNS servers that would respond to queries for Microsoft-related domains (e.g., login.microsoftonline.com, outlook.office365.com). Instead of returning the real IP address, the rogue DNS servers returned the IP of a server controlled by the hackers—one that ran a fake Microsoft authentication portal. This step ensured that any user trying to access Office 365 services would be redirected to the attacker’s malicious site.

Step 4: Intercept OAuth Authentication Tokens

When a user on the compromised network typed in their Office 365 email and password, the DNS hijack sent them to the fake login page. The fake page captured the credentials and then forwarded them to the real Microsoft server, completing the login. More critically, because OAuth tokens are transmitted after a successful login, the attacker’s server intercepted those tokens. Tokens are passed in HTTP headers or URL parameters, and the malicious server logged them silently. Once captured, the hackers could reuse the token to access the user’s Microsoft data (emails, files, etc.) without needing the password again, as the token provides short-lived but powerful access.

russian hackers exploited
Image via Flickr

Step 5: Scale and Maintain Persistent Access

Forest Blizzard’s operation compromised over 18,000 routers by late 2025, affecting more than 200 organizations and 5,000 consumer devices. The hackers targeted government agencies, ministries of foreign affairs, law enforcement, and third-party email providers. By leaving the routers otherwise operational, they avoided detection—no malware, no unusual traffic spikes. They simply changed DNS settings, which are rarely monitored for integrity. The attack chain required no interaction with end-user devices; anyone connected to a compromised router was automatically at risk.

Tips to Defend Against This Type of Attack

Understanding the mechanics behind the Forest Blizzard campaign shows how low-tech router attacks can lead to high-value credential theft. By applying these defensive tips, organizations can close the door on DNS hijacking.

Explore

Enterprise AI at a Crossroads: 95% of Projects Fail as Structural Flaws Exposed Microsoft Expands Agentic AI Platform for R&D, Reports Real-World Breakthroughs Exploring VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windo... 10 Key Insights into Cigna’s ACA Individual Market Exit and What It Means for Patients Meta Unveils Adaptive Ranking Model: LLM-Scale Ads Intelligence Without the Latency