Close Menu
Stratnews GlobalStratnews Global
    Facebook X (Twitter) Instagram
    Trending
    • Russian DNS Hijacking Network Disrupted By US
    • Artemis II Lunar Flyby Images Reveal Moon Far Side
    • TikTok Finland Data Centre Expansion Announced
    • Russia Iran Satellites Boost Strike Coordination
    • Chinese Tech Military System Explained
    • The Fly On The Wall Is A Spy: New-Age Defence Equipment
    • Pakistan EV Surge Gains Pace Amid Fuel Crisis
    • Tianzhou 10 Logo Revealed For 2026 Mission
    • Support Us
    Stratnews GlobalStratnews Global
    Write for Us
    Wednesday, April 8
    • Space
    • Science
    • AI and Robotics
    • Industry News
    • Support Us
    Stratnews GlobalStratnews Global
    Home » Russian DNS Hijacking Network Disrupted By US

    Russian DNS Hijacking Network Disrupted By US

    Kanika SharmaBy Kanika SharmaApril 8, 2026 World No Comments3 Mins Read
    Russian DNS hijacking

    US Disrupts Russian DNS Hijacking Network in Global Cyber Operation

    The United States Justice Department announced that it has successfully disrupted a large scale DNS hijacking network linked to a Russian military intelligence unit. The operation, carried out under court authorisation, targeted infrastructure used to conduct cyber espionage against global victims.

    According to officials, the network was operated by a unit within Russia’s Main Intelligence Directorate of the General Staff. This group allegedly used compromised routers to execute hijacking campaigns affecting individuals and organisations worldwide. Targets included sectors such as government, military, and critical infrastructure, highlighting the broad scope of the operation.

    Thousands Of Routers Exploited Worldwide

    Authorities revealed that the campaign involved the compromise of thousands of routers across multiple regions. These devices were used to redirect internet traffic, allowing attackers to monitor and filter data flows. As a result, the hackers could identify high value targets with precision.

    Once targets were selected, the attackers intercepted unencrypted network traffic. This enabled them to collect sensitive information, including passwords, authentication tokens, and email communications. Consequently, the operation posed a significant threat to both personal and institutional security.

    In response, the Federal Bureau of Investigation identified affected routers within the United States. Investigators gathered evidence of the intrusion, severed unauthorised access, and restored the devices to normal functionality. This intervention formed a critical component of the broader disruption effort.

    Operation Masquerade And International Cooperation

    The takedown effort, known as Operation Masquerade, involved collaboration with partners across 15 countries. This coordinated approach allowed authorities to dismantle key elements of the network and prevent further exploitation.

    Officials emphasised that without intervention, the attackers would have continued intercepting data and extracting sensitive information. The operation therefore marked a decisive step in countering ongoing cyber threats linked to Russian intelligence activities.

    At the same time, agencies in Germany and Britain issued warnings regarding the campaign. These advisories underscored the widespread nature of the threat and the need for heightened vigilance across affected regions.

    Ongoing Threat From Advanced Cyber Campaigns

    Further analysis from cybersecurity firms indicated that the operation impacted hundreds of organisations and thousands of consumer devices. The targets spanned multiple continents, including North America, Europe, and parts of Asia and Africa.

    Researchers noted that government institutions, law enforcement bodies, and email service providers were among the primary targets. This focus reflects a strategic effort to access sensitive communications and intelligence.

    The disruption highlights the persistent nature of state backed cyber operations. Despite the success of this intervention, officials warn that such threats remain ongoing and continue to evolve. As a result, international cooperation and proactive defence measures remain essential in addressing future cyber risks.

    With inputs from Reuters

    Author

    • Kanika Sharma
      Kanika Sharma
      View all posts
    Featured
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit Telegram WhatsApp
    Kanika Sharma
    Kanika Sharma

      Keep Reading

      Artemis II Lunar Flyby Images Reveal Moon Far Side

      TikTok Finland Data Centre Expansion Announced

      Russia Iran Satellites Boost Strike Coordination

      Chinese Tech Military System Explained

      The Fly On The Wall Is A Spy: New-Age Defence Equipment

      Pakistan EV Surge Gains Pace Amid Fuel Crisis

      Add A Comment
      Leave A Reply Cancel Reply

      Anti Drone System (CUAS)
      Latest Posts

      Russian DNS Hijacking Network Disrupted By US

      April 8, 2026

      Artemis II Lunar Flyby Images Reveal Moon Far Side

      April 8, 2026

      TikTok Finland Data Centre Expansion Announced

      April 8, 2026

      Russia Iran Satellites Boost Strike Coordination

      April 8, 2026

      Chinese Tech Military System Explained

      April 8, 2026

      The Fly On The Wall Is A Spy: New-Age Defence Equipment

      April 8, 2026

      Pakistan EV Surge Gains Pace Amid Fuel Crisis

      April 7, 2026

      Tianzhou 10 Logo Revealed For 2026 Mission

      April 7, 2026

      Anthropic Compute Deal Drives AI Expansion

      April 7, 2026

      Artemis II Crater Named Carroll In Emotional Tribute

      April 7, 2026

      Subscribe to News

      Get the latest sports news from NewsSite about world, sports and politics.

      • Astronomical Events
      • Space Missions
      • Industry News
      • Science
      StratNewsGlobal Tech
      Facebook X (Twitter) Instagram LinkedIn YouTube
      © 2026 StratNews Global, A unit of BharatShakti Communications LLP
      • About Us
      • Contributors
      • Copyright
      • Contact
      • Write for Us

      Type above and press Enter to search. Press Esc to cancel.