TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Krebs on Security

Russia Hacked Routers to Steal Microsoft Office Tokens

BrianKrebs · 2026-04-07 · Read original ↗

ATT&CK techniques detected

4 predictions
T1557.001Name Resolution Poisoning and SMB Relay
95%
"individuals to reach websites by typing familiar addresses, instead of associated ip addresses. in a dns hijacking attack, bad actors interfere with this process to covertly send users to malicious websites designed to steal login details or other sensitive information. english s…"
T1584.008Network Devices
71%
"the malware approach in favor of mass - altering the dns settings on thousands of vulnerable routers. “ before the last ncsc report came out they used this capability in very limited instances, ” adamitis told krebsonsecurity. “ after the report was released they implemented the …"
T1557.001Name Resolution Poisoning and SMB Relay
71%
"did this in an old - school, graybeard way that isn ’ t really sexy but it gets the job done. ” microsoft refers to the forest blizzard activity as using dns hijacking “ to support post - compromise adversary - in - the - middle ( aitm ) attacks on transport layer security ( tls …"
T1190Exploit Public-Facing Application
61%
"the malware approach in favor of mass - altering the dns settings on thousands of vulnerable routers. “ before the last ncsc report came out they used this capability in very limited instances, ” adamitis told krebsonsecurity. “ after the report was released they implemented the …"

Summary

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.