Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsSanctioned Bulletproof Host Linked to Hijacking of Old Home Routers
Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers
Cybersecurity

Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers

•February 5, 2026
0
HackRead
HackRead•Feb 5, 2026

Companies Mentioned

Aeza

Aeza

Infoblox

Infoblox

BLOX

Unsplash

Unsplash

Why It Matters

Router‑level DNS control gives attackers a stealthy, scalable foothold to monetize compromised users, exposing millions to fraud and malware. The involvement of a sanctioned bullet‑proof host underscores geopolitical risks in cyber‑crime infrastructure.

Key Takeaways

  • •Outdated routers lack security updates, enabling DNS hijacks
  • •Attackers redirected DNS via Aeza International bulletproof hosting
  • •Over 30 countries affected by router-level DNS manipulation
  • •Traffic routed through ad networks, delivering malicious sites
  • •Replacing routers is primary mitigation strategy

Pulse Analysis

Legacy consumer routers remain a soft target because manufacturers often discontinue firmware updates after a few years. When a router’s DNS configuration is compromised, every device on the network inherits the malicious resolution, effectively turning a single vulnerable appliance into a gateway for widespread traffic manipulation. This attack vector is especially insidious because users see no visual cues; standard browsing appears normal while background requests are silently rerouted to hostile destinations.

The campaign’s infrastructure leveraged Aeza International, a Russian bullet‑proof hosting service sanctioned by the United States in July 2025. By hosting the first stage of the DNS redirection on a sanctioned platform, the operators insulated themselves from takedown efforts and law‑enforcement scrutiny. After confirming a victim’s router was compromised, the system funneled traffic through an HTTP‑based distribution layer that channeled users into advertising and affiliate networks, monetizing the hijack through click‑fraud and malicious payload delivery. This two‑stage approach demonstrates how cyber‑criminals blend geopolitical evasion tactics with profit‑driven models.

For consumers, the immediate remedy is straightforward: replace aging routers with models that receive regular security patches or flash supported firmware where possible. Enterprises should audit home‑office devices and consider DNS‑filtering solutions that can detect anomalous resolution patterns. The broader industry response may include tighter regulation of bullet‑proof hosting services and increased collaboration between security firms and ISPs to flag compromised DNS traffic. As the Internet of Things expands, ensuring that every network edge device maintains up‑to‑date security will be critical to thwarting similar large‑scale hijacking campaigns.

Sanctioned Bulletproof Host Linked to Hijacking of Old Home Routers

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...