<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
<loc>https://iplogger.org/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>en</news:language>
</news:publication>
<news:publication_date>2026-04-08T04:00:01+00:00</news:publication_date>
<news:title>APT28's "SOHOStorm": Global DNS Hijacking Campaign Exploits MikroTik and TP-Link Routers</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/de/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>de</news:language>
</news:publication>
<news:publication_date>2026-04-08T04:00:01+00:00</news:publication_date>
<news:title>APT28s "SOHOStorm": Globale DNS-Hijacking-Kampagne nutzt MikroTik- und TP-Link-Router aus</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/fr/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>fr</news:language>
</news:publication>
<news:publication_date>2026-04-08T04:00:01+00:00</news:publication_date>
<news:title>APT28 "SOHOStorm": La Campagne Mondiale de Détournement DNS Exploite les Routeurs MikroTik et TP-Link</news:title>
</news:news>
</url>
<url>
<loc>https://iplogger.org/es/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://iplogger.org/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="de" href="https://iplogger.org/de/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="fr" href="https://iplogger.org/fr/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<xhtml:link rel="alternate" hreflang="es" href="https://iplogger.org/es/blog/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/" />
<news:news>
<news:publication>
<news:name>IPLogger News</news:name>
<news:language>es</news:language>
</news:publication>
<news:publication_date>2026-04-08T04:00:01+00:00</news:publication_date>
<news:title>APT28 "SOHOStorm": Campaña Global de Secuestro de DNS Explota Routers MikroTik y TP-Link</news:title>
</news:news>
</url>
</urlset>