<h3>Overview</h3>
<p>On <strong>April 7, 2026</strong>, the <span class="key-term" data-definition="U.S. Justice Department — Federal executive department responsible for law enforcement and legal affairs (GS3: Governance/Polity)">U.S. Justice Department</span> announced a court‑authorised operation that dismantled a global <span class="key-term" data-definition="Domain Name System (DNS) hijacking — cyber‑attack where attackers redirect internet traffic by altering DNS records, compromising confidentiality and integrity (GS3: Technology & Security)">DNS hijacking</span> network. The network was traced to Russia’s <span class="key-term" data-definition="GRU (Main Intelligence Directorate) — Russia’s military intelligence agency under the General Staff, involved in espionage and cyber operations (GS2: Polity)">GRU</span> and specifically to <span class="key-term" data-definition="Military Unit 26165 — specific unit within the GRU responsible for cyber‑espionage activities (GS2: Polity)">Military Unit 26165</span>.</p>
<h3>Key Developments</h3>
<ul>
<li>The operation was carried out under a court order, highlighting legal coordination between law‑enforcement agencies.</li>
<li>The <span class="key-term" data-definition="GRU (Main Intelligence Directorate) — Russia’s military intelligence agency under the General Staff, involved in espionage and cyber operations (GS2: Polity)">GRU</span> used compromised <span class="key-term" data-definition="Router — networking device that forwards data packets between computer networks; compromised routers can be used for surveillance (GS3: Technology)">routers</span> to hijack DNS queries worldwide.</li>
<li>Targets included individuals in the military, government and critical‑infrastructure sectors across multiple continents.</li>
<li><strong>Brett Leatherman</strong>, assistant director of the <span class="key-term" data-definition="FBI Cyber Division — branch of the Federal Bureau of Investigation that investigates cyber crimes and protects national cyber infrastructure (GS3: Governance)">FBI’s Cyber Division</span>, warned that merely sounding the alarm would be insufficient given the scale of the threat.</li>
</ul>
<h3>Important Facts</h3>
<p>The investigation revealed that the hijacking infrastructure relied on a chain of <span class="key-term" data-definition="Router — networking device that forwards data packets between computer networks; compromised routers can be used for surveillance (GS3: Technology)">routers</span> located in the United States and abroad. By altering DNS responses, the attackers could redirect traffic to malicious servers, enabling espionage and data exfiltration. The operation disrupted the command‑and‑control servers, effectively neutralising the network’s ability to conduct further hijacks.</p>
<h3>UPSC Relevance</h3>
<p>For GS 2 (Polity) candidates, the episode underscores the role of state‑run intelligence agencies in cyber warfare and the importance of international legal mechanisms in counter‑espionage. GS 3 (Technology & Security) aspirants should note the technical vector—<span class="key-term" data-definition="Domain Name System (DNS) hijacking — cyber‑attack where attackers redirect internet traffic by altering DNS records, compromising confidentiality and integrity (GS3: Technology & Security)">DNS hijacking</span>—and the vulnerability of critical‑infrastructure networks. The coordination between the <span class="key-term" data-definition="U.S. Justice Department — Federal executive department responsible for law enforcement and legal affairs (GS3: Governance/Polity)">U.S. Justice Department</span>, the judiciary and the <span class="key-term" data-definition="FBI Cyber Division — branch of the Federal Bureau of Investigation that investigates cyber crimes and protects national cyber infrastructure (GS3: Governance)">FBI’s Cyber Division</span> illustrates inter‑agency collaboration, a theme relevant to GS 1 (Governance) and GS 4 (Ethics) discussions on accountability in cyber operations.</p>
<h3>Way Forward</h3>
<p>India must strengthen its own <span class="key-term" data-definition="Router — networking device that forwards data packets between computer networks; compromised routers can be used for surveillance (GS3: Technology)">router</span> security protocols, enforce strict DNS monitoring, and develop rapid response teams akin to the U.S. model. Enhancing legal frameworks for cross‑border cyber‑crime investigations and fostering intelligence sharing with allied nations will be crucial to mitigate similar threats in the future.</p>