美国司法部反击俄罗斯军事情报部门对美国目标的攻击。
Justice Department Counters Russian Military Intelligence Unit Attack On US Targets

原始链接: https://www.zerohedge.com/political/justice-department-counters-russian-military-intelligence-unit-attack-us-targets

## 假面行动:美国破坏俄罗斯网络活动 美国司法部和联邦调查局最近宣布“假面行动”,这是一项获得法院批准的行动,旨在消除遍布全美国的被入侵路由器网络。俄罗斯军事情报部门26165(GRU),以多个别名著称,劫持了小型办公室和家庭办公室路由器——特别是TP-Link型号——以进行恶意DNS劫持并窃取敏感数据。 自2024年以来,GRU利用漏洞获得未经授权的访问,将互联网流量重定向到他们自己的服务器,以拦截目标受害者的密码、电子邮件和身份验证令牌,其中包括美国军人、政府实体和关键基础设施。 联邦调查局开发并部署了命令到受影响的路由器,重置DNS设置并阻止GRU访问,*且不*中断合法用户活动。他们正在与互联网服务提供商合作,通知用户并建议路由器所有者更新固件、验证DNS设置以及更换已停用的设备。 此行动紧随之前破坏GRU网络活动的行动之后,包括在2024年2月摧毁一个僵尸网络以及对支持乌克兰的援助组织发动攻击的警告。

相关文章

原文

Authored by Kimberly Hayek via The Epoch Times (emphasis ours),

The Justice Department and FBI on Tuesday revealed they have conducted a court-approved technical operation to neutralize part of a network of small office and home office routers in the United States that become commandeered by a unit of Russia’s military intelligence.

The Department of Justice in Washington on March 11, 2026. Madalina Kilroy/The Epoch Times

Russian Military Unit 26165—also known as APT28, Sofacy Group, Forest Blizzard, Pawn Storm, Fancy Bear, and Sednit—is part of Russia’s Main Intelligence Directorate of the General Staff and has compromised routers to execute malicious Domain Name System (DNS) hijacking operations across the planet.

They targeted individual U.S. military members, the U.S. government, and critical infrastructure in which the Russian government expected to gain intelligence.

U.S. Attorney David Metcalf for the Eastern District of Pennsylvania said critical data had been commandeered.

“In the face of continued aggression by our nation-state adversaries, the U.S. government will respond just as aggressively,” Metcalf said. “Working with the FBI—and our partners around the world—we are committed to disrupting and exposing such threats to our nation’s cybersecurity.”

Assistant Director Brett Leatherman of FBI’s Cyber Division said U.S. and global routers had been compromised and that the FBI will continue to use its authorities to identify and impose costs on state-sponsored actors who target the American people.

Given the scale of this threat, sounding the alarm wasn’t enough,” Leathernan said. “The FBI conducted a court-authorized operation to harden compromised routers across the United States.”

The FBI operation, called Operation Masquerade, is the most recent U.S. action to undermine continuous Russian state-sponsored cyber threats that exploit everyday consumer devices.

Since 2024, GRU actors have attacked known vulnerabilities in TP-Link routers worldwide to steal administrative credentials. They then obtained unauthorized access to devices and changed their settings to redirect DNS queries to GRU-controlled malicious resolvers.

The actors set up automated filters to identify high-value traffic before intercepting it. The malicious resolvers returned fraudulent DNS records that appeared to be legitimate services, including Microsoft Outlook Web Access.

This allowed man-in-the-middle attacks on what victims thought was encrypted network traffic. The GRU was able to harvest unencrypted passwords, authentication tokens, emails, and other sensitive data from devices on the compromised router’s local network.

The operation included technical contributions from Black Lotus Labs at Lumen, Microsoft Threat Intelligence, and MIT Lincoln Laboratory.

“Operation Masquerade was led by FBI Boston. It represents the latest example of how we’re defending our homeland from Russia’s GRU which weaponized routers owned by unsuspecting Americans in more than 23 states to steal sensitive government, military, and critical infrastructure information,” special agent in charge of the FBI’s Boston Field Office Ted E. Docks said.

He noted that the FBI employed cutting edge technology and leveraged private sector and international partners to combat the malicious activity and remediate routers.

Court documents from the case, filed in the Eastern District of Pennsylvania, outline how the FBI developed and tested commands sent only to affected routers in the United States.

The commands revealed evidence of GRU schemes, reset the devices’ DNS settings to legitimate resolvers of internet service providers, and shut down the original unauthorized access points. TP-Link router firmware and hardware settings confirmed the operation would not interrupt normal router function or collect users’ personal data.

Legitimate owners can change the settings through a factory reset with the hardware button or by manually restoring settings through the router’s web interface.

The FBI has also been working with internet service providers to inform affected users.

Owners of small office and home office routers are advised to replace end-of-life or end-of-support devices, upgrade to the newest firmware, verify that DNS resolvers are the same as those provided by the internet service provider, and review firewall rules to prevent unnecessary remote management access.

The GRU’s Unit 26165 was the subject of May 2025 joint advisory from the Cybersecurity and Infrastructure Security Agency, as well as international partners, describing how the unit attacked Western logistics and technology companies delivering aid to Ukraine. The campaign, dating back to 2022, impacted organizations in 13 nations, including the United States, Germany, and France.

In April 2025, French officials said a series of hacks since 2021 were the work of the same GRU unit.

The Russian military intelligence service (GRU) has been deploying a cyber-offensive modus operandi called APT28 against France for several years. It has targeted around 10 French entities since 2021,” Jean-Noël Barrot, the French foreign minister, wrote on social media platform X.

In a February 2024 disruption, the Justice Department took apart a GRU-controlled botnet that had attacked hundreds of small or home office routers around the world with malware. The FBI used the same malware to copy and delete stolen data while changing firewall rules to ban remote management access.

联系我们 contact @ memedata.com