Front Page

Nation-State Infrastructure

Operation Masquerade Dismantled: DOJ and Allies Seize APT28's 18,000-Router DNS Hijacking Network

The DOJ, FBI, UK NCSC, and allied agencies revealed on April 8 the court-authorized disruption of Operation Masquerade — a Russian GRU (APT28 / Fancy Bear) botnet of 18,000 compromised SOHO routers across 120+ countries. The GRU hijacked router DNS resolvers to redirect traffic to fraudulent servers impersonating Microsoft Outlook Web Access, silently harvesting passwords, authentication tokens, and email content.

The FBI deployed court-authorized commands directly to compromised US routers — collecting forensic evidence, resetting malicious DNS resolvers, and blocking the original access vector. DNS hijacking leaves no malware on victim endpoints; investigators must work entirely from router configuration snapshots, DNS query histories, and cloud-service authentication logs.

Cloud Forensics

CERT-EU's Kill Chain: How TruffleHog Became the Attacker's Pivot Tool Inside the Commission's AWS Environment

CERT-EU's April 12 reconstruction confirmed the Trivy breach reached 71 EU entities — 42 Commission bodies plus 29 other EU organizations. After obtaining the initial AWS API key, the attacker immediately used TruffleHog to harvest additional cloud credentials, then created a new IAM key attached to an existing user to blend into normal account activity.

The 340 GB of uncompressed data appeared on ShinyHunters nine days after initial access — compressing the remediation window to hours. Security tooling in CI/CD pipelines must itself be subject to integrity verification, and DFIR teams must add secrets-scanning tools like TruffleHog to their threat models as attacker pivot instruments.

Threat Bulletin

ACTIVE EXPLOIT
CVE-2026-34621

Adobe Acrobat & Reader — JavaScript prototype pollution enables RCE when a victim opens a crafted PDF; CVSS 8.6. Exploited since late 2025; emergency patch April 12; CISA KEV April 13 with April 27 federal deadline. Forensic Note: Review email gateway logs for PDF delivery and endpoint telemetry for Reader spawning unexpected child processes.

ACTIVE EXPLOIT
CVE-2012-1854

Microsoft Office VBA — Insecure library loading (DLL hijacking) originally disclosed 2012; re-added to CISA KEV April 13 due to active re-exploitation combined with modern initial-access chains. Forensic Note: Hunt for DLL side-loading artifacts in VBA macro process trees and unexpected DLL loads from user-writable directories.

Malware Spotlight

Omnistealer (North Korea)

North Korea-linked infostealer using TRON blockchain as C2 — payloads embedded in BSC transaction input fields, making sinkholing useless. Targets 10+ password managers, 60+ crypto wallets, and cloud credentials; ~300,000 credentials stolen. Forensic Note: Hunt outbound connections to TRON and Aptos RPC endpoints; on-chain transaction analysis is now a required DFIR capability for this class of malware.