Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian military intelligence infiltrated 18,000 home networks through TP-Link and MikroTik routers to steal work credentials

C. da Costa Avatar
C. da Costa Avatar

By

Image: DepositPhotos

Key Takeaways

Key Takeaways

  • Forest Blizzard exploited TP-Link and MikroTik routers to steal Microsoft 365 passwords
  • Hackers altered DNS settings to redirect logins through Russian intelligence servers
  • Over 18,000 networks infected at peak, exposing government and business credentials

Russian spies turned thousands of consumer routers into password-stealing machines targeting Microsoft 365 users. Working from your kitchen table seemed harmless until Russian military intelligence decided your TP-Link router was the perfect espionage tool. Forest Blizzard, the hacker group tied to Russia’s GRU, has spent months infiltrating home and small office routers to intercept Microsoft 365 logins. They’re not breaking down digital doors—they’re rewiring the very foundation of your internet connection.

The campaign exploited vulnerabilities in popular router models like TP-Link’s WR841N and Archer series, plus MikroTik devices. These aren’t exotic enterprise targets. They’re the same routers you bought at Best Buy for streaming Netflix and Zoom calls.

How Your Router Became a Spy Tool

Hackers manipulated DNS settings to redirect your work logins through their servers.

Here’s the terrifying simplicity: attackers altered your router’s DNS and DHCP settings, essentially hijacking the internet’s address book for every device on your network. When you log into Microsoft 365, your credentials travel through their servers first.

They present fake security certificates that most systems accept, exposing your email, files, and authentication tokens in plain text. No malware installation required. No suspicious downloads. Just configuration changes that turn your trusted home router into an adversary-in-the-middle attack platform.

According to Lumen Black Lotus Labs, “The actor essentially ran a proxy service as the AitM.”

The Damage Done

Over 5,000 consumer devices and 200 organizations fell victim to the FrostArmada campaign.

Peak infection hit 18,000 networks in December 2025, targeting everyone from government agencies to small businesses using Microsoft 365. The hackers didn’t discriminate—if your router had unpatched firmware and weak credentials, you became reconnaissance infrastructure for Russian intelligence operations.

Authorities including the FBI and UK NCSC disrupted the campaign in April, but the damage exposes how consumer networking gear creates pathways into professional environments. Your home router isn’t just streaming your TikTok addiction anymore—it’s handling sensitive work communications.

Securing Your Home Office

Three immediate steps to protect your remote work setup from state-sponsored espionage.

  • Update your router firmware immediately and change default admin credentials
  • Enable multi-factor authentication on your Microsoft 365 account
  • Consider network segmentation using a separate router or guest network for work devices

Most attacked devices were running outdated software with predictable passwords. Even if hackers intercept your password, they can’t bypass that second verification step. Use a separate router or guest network for work devices, isolating professional traffic from your smart home gadgets and gaming consoles.

Your router shouldn’t be the weakest link between your kitchen table and corporate espionage. In an era where nation-states target consumer hardware for intelligence gathering, treating your home security like enterprise equipment isn’t paranoia—it’s professional survival.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →