Russian hackers deliver malicious RDP configuration files to thousands

Share:

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Protocol (RDP) configuration file.

“Based on our investigation of previous Midnight Blizzard spear-phishing campaigns, we assess that the goal of this operation is likely intelligence collection,” Microsoft’s threat analysts say.

Midnight Blizzard

Midnight Blizzard (aka Cozy Bear, APT29, and UNC2452) has been implicated in a number of high-profile attacks in the last decade or so:

  • The 2014 compromise of US State Department and White House networks
  • The 2016 compromise of the US Democratic National Committee
  • Breaches following the 2020 compromise of SolarWinds’ Orion software
  • The 2024 breach of Microsoft and HPE corporate maliboxes, and others.

“Midnight Blizzard is consistent and persistent in its operational targeting, and its objectives rarely change,” Microsoft notes.

“It uses diverse initial access methods, including spear phishing, stolen credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers’ trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known as FoggyWeb and MagicWeb.”

The spear-phishing campaign

The group’s spear-phishing tactics are always changing. Last year, for example, have been spotted trying to phish government employees via Microsoft Teams.

In this latest campaign, which is still ongoing, Midnight Blizzard tries to trick targets into downloading and opening a RDP configuration file (.rdp).

The emails are sent from legitimate email addresses that were compromised in previous attacks. The thousands of targeted recipients are employees of governmental agencies, higher education, defense, and non-governmental organizations in dozens of countries, including the UK, Europe, Australia, and Japan.

As the Ukrainian CERT team recently warned, running the malicious file will establish an outgoing RDP connection with the attackers’ server, allowing the server access to disks, network resources, printers, COM ports, audio devices, the clipboard and other resources (including credentials) on the targets’ computer, as well as put into place technical prerequisites for running third-party programs or scripts.

Midnight Blizzard RDP file

The prompts shown when running the malicios file (Source: Microsoft)

“The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust,” Microsoft says.

Amazon shared that some of the domain names they used tried to trick the targets into believing the domains were AWS domains, and that the company initiated the process of seizing them.

CERT-UA advised blocking RDP files on the mail gateway, blocking users from running RDP files (with exeptions), and configuring the firewall to limit the possibility of establishing RDP connections by the mstsc.exe program to resources on the Internet.

Microsoft has provided indicators of compromise related to this campaign, as well as mitigations and hunting queries.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:41 pm, Jun 26, 2025
weather icon 18°C
L: 17° | H: 19°
broken clouds
Humidity: 53 %
Pressure: 1018 mb
Wind: 15 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 78%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:44 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
17° | 19°°C 1 mm 100% 13 mph 71 % 1021 mb 0 mm/h
Sat Jun 28 10:00 pm
weather icon
18° | 28°°C 0 mm 0% 11 mph 87 % 1025 mb 0 mm/h
Sun Jun 29 10:00 pm
weather icon
19° | 32°°C 0 mm 0% 6 mph 79 % 1025 mb 0 mm/h
Mon Jun 30 10:00 pm
weather icon
22° | 36°°C 0 mm 0% 15 mph 66 % 1020 mb 0 mm/h
Tue Jul 01 10:00 pm
weather icon
21° | 29°°C 0 mm 0% 9 mph 66 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
17° | 18°°C 0 mm 0% 9 mph 52 % 1018 mb 0 mm/h
Tomorrow 4:00 am
weather icon
15° | 16°°C 1 mm 100% 7 mph 71 % 1019 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.72 mm 72% 8 mph 69 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
20° | 20°°C 0 mm 0% 11 mph 57 % 1020 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
23° | 23°°C 0 mm 0% 11 mph 44 % 1020 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
28° | 28°°C 0 mm 0% 12 mph 40 % 1019 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
26° | 26°°C 0 mm 0% 13 mph 37 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
21° | 21°°C 0 mm 0% 10 mph 61 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,699.31
-0.31%
Ethereum(ETH)
€2,074.09
-0.29%
Tether(USDT)
€0.86
-0.02%
XRP(XRP)
€1.81
-3.15%
Solana(SOL)
€120.60
-2.28%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.137744
-2.94%
Shiba Inu(SHIB)
€0.000009
-3.51%
Pepe(PEPE)
€0.000008
-3.14%
Scroll to Top