<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DNS Hijacking on Juan Carlos Munera</title><link>https://cybersecpro.me/tags/dns-hijacking/</link><description>Recent content in DNS Hijacking on Juan Carlos Munera</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Juan Carlos Munera</copyright><lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cybersecpro.me/tags/dns-hijacking/index.xml" rel="self" type="application/rss+xml"/><item><title>Operation Masquerade: FBI Disrupts APT28 Campaign Across 18,000 Hijacked Routers</title><link>https://cybersecpro.me/posts/operation-masquerade-fbi-apt28-router-dns-hijacking/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/operation-masquerade-fbi-apt28-router-dns-hijacking/</guid><description>The threat group tracked as APT28 (Forest Blizzard/Fancy Bear) compromised 18,000 SOHO routers across 120+ countries by exploiting known vulnerabilities and default SNMP credentials. They modified DNS settings to redirect traffic through attacker-controlled servers, enabling adversary-in-the-middle attacks that harvested Microsoft OAuth tokens, passwords, and emails from 200+ organizations. The FBI&amp;rsquo;s Operation Masquerade sent court-authorized commands to reset compromised routers on U.S. soil.</description></item></channel></rss>