Headlines

US disrupts Russian military-run DNS hijacking network, Justice Department says

Published by Global Banking & Finance Review

Posted on April 7, 2026

3 min read

· Last updated: April 8, 2026

Add as preferred source on Google
US disrupts Russian military-run DNS hijacking network, Justice Department says
Global Banking & Finance Awards 2026 — Call for Entries

WASHINGTON, April 7 (Reuters) - The U.S. Justice Department said on Tuesday it carried out a court-authorized disruption of a DNS hijacking network controlled by a Russian military intelligence unit.

US disrupts Russian military-run DNS hijacking network, Justice Department says

Justice Department Disrupts Russian GRU DNS Hijacking Network

WASHINGTON, April 7 (Reuters) - The U.S. Justice Department said on Tuesday it carried out a court-authorized disruption of a DNS hijacking network controlled by a Russian military intelligence unit.

The network was operated by Russia's Main Intelligence Directorate of the General Staff (GRU) Military Unit 26165, the department said in a statement.

How the DNS Hijacking Network Operated

It added the GRU used routers to facilitate hijacking operations against worldwide targets, including individuals in military, government and critical infrastructure sectors. 

The efforts targeted thousands of routers worldwide and enabled the Russian hackers to filter traffic to identify specific targets, according to the Justice Department.

Target Identification and Data Capture

Once targets were identified, targets' unencrypted network traffic was captured, providing the hackers with passwords, authentication tokens, emails and other sensitive information, it added.

US Response and Operation Masquerade

FBI and Justice Department Actions

"GRU actors compromised routers in the U.S. and around the world, hijacking them to conduct espionage. Given the scale of this threat, sounding the alarm wasn't enough," said Brett Leatherman, the assistant director of the FBI’s Cyber Division.

The FBI identified compromised routers in the U.S., collected evidence of Russian targeting, cut off GRU access, and reset them to normal functionality, the Justice Department said in its statement.

International Collaboration

In a post on social media platform X, Leatherman said the takedown effort, dubbed "Operation Masquerade," included partners in 15 countries. 

Potential Consequences Without Action

Without action, "the GRU would have continued intercepting encrypted traffic and stealing sensitive information," he said, adding, "Russia's cyber program is an enduring threat." 

Global Reaction and Impact

International Advisories

Officials in Germany and Britain also issued advisories about the hacking campaign on Tuesday. 

The Russian Embassy in Washington did not respond to requests for comment. 

Industry and Researcher Insights

The operation is the latest example of intelligence collection carried out by the Russian military intelligence hacking unit, Microsoft said in a blog post released ahead of the Justice Department's statement. Microsoft identified more than 200 organizations and 5,000 consumer devices impacted by the hacking operation, the company said.

Lumen Technologies' Black Lotus Labs, which identified part of the botnet infrastructure last year, said in a blog post that the operations primarily targeted government agencies, including ministries of foreign affairs, law enforcement and third-party email providers.

Geographical Scope of Attacks

The researchers did not identify specific targets, but said their analysis revealed targets in the U.S., Europe, Afghanistan, North Africa, Central America and Southeast Asia.

(Reporting by Jasper Ward in Washington and AJ Vicens in Detroit; Editing by Daphne Psaledakis and Jamie Freed)

Key Takeaways

  • The DOJ disabled a global DNS hijacking infrastructure run by Russia’s GRU Unit 26165, used for espionage via compromised small office/home office (SOHO) routers (thecyberwire.com)
  • The GRU exploited routers across the U.S. and internationally to hijack traffic, harvest credentials, proxy data, and support spear‑phishing operations (thecyberwire.com)
  • Brett Leatherman, Assistant Director of the FBI Cyber Division since June 2025, emphasized that due to the scale of the threat, merely warning was insufficient—active disruption was necessary (en.wikipedia.org)

References

Frequently Asked Questions

What action did the US Justice Department take against Russian DNS hijacking?
The US Justice Department carried out a court-authorized disruption of a Russian military-controlled DNS hijacking network.
Who operated the disrupted DNS hijacking network?
The network was operated by Russia's Main Intelligence Directorate of the General Staff (GRU), specifically Military Unit 26165.
What targets were affected by the Russian DNS hijacking operation?
The GRU's operation targeted worldwide individuals in military, government, and critical infrastructure sectors.
How did Russian actors carry out the DNS hijacking?
GRU actors compromised routers in the US and worldwide, hijacking them to conduct espionage activities.

Tags

Related Articles

More from Headlines

Explore more articles in the Headlines category