Russische Hacker liefern bösartige RDP-Konfigurationsdateien an Tausende

Teilen:

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Protocol (RDP) configuration file.

“Based on our investigation of previous Midnight Blizzard spear-phishing campaigns, we assess that the goal of this operation is likely intelligence collection,” Microsoft’s threat analysts say.

Midnight Blizzard

Midnight Blizzard (aka Cozy Bear, APT29, and UNC2452) has been implicated in a number of high-profile attacks in the last decade or so:

  • The 2014 compromise of US State Department and White House networks
  • The 2016 compromise of the US Democratic National Committee
  • Breaches following the 2020 compromise of SolarWinds’ Orion software
  • The 2024 breach of Microsoft and HPE corporate maliboxes, and others.

“Midnight Blizzard is consistent and persistent in its operational targeting, and its objectives rarely change,” Microsoft notes.

“It uses diverse initial access methods, including spear phishing, stolen credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers’ trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known as FoggyWeb and MagicWeb.”

The spear-phishing campaign

The group’s spear-phishing tactics are always changing. Last year, for example, have been spotted trying to phish government employees via Microsoft Teams.

In this latest campaign, which is still ongoing, Midnight Blizzard tries to trick targets into downloading and opening a RDP configuration file (.rdp).

The emails are sent from legitimate email addresses that were compromised in previous attacks. The thousands of targeted recipients are employees of governmental agencies, higher education, defense, and non-governmental organizations in dozens of countries, including the UK, Europe, Australia, and Japan.

As the Ukrainian CERT team recently warned, running the malicious file will establish an outgoing RDP connection with the attackers’ server, allowing the server access to disks, network resources, printers, COM ports, audio devices, the clipboard and other resources (including credentials) on the targets’ computer, as well as put into place technical prerequisites for running third-party programs or scripts.

Midnight Blizzard RDP file

The prompts shown when running the malicios file (Source: Microsoft)

“The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust,” Microsoft says.

Amazon shared that some of the domain names they used tried to trick the targets into believing the domains were AWS domains, and that the company initiated the process of seizing them.

CERT-UA advised blocking RDP files on the mail gateway, blocking users from running RDP files (with exeptions), and configuring the firewall to limit the possibility of establishing RDP connections by the mstsc.exe program to resources on the Internet.

Microsoft has provided indicators of compromise related to this campaign, as well as mitigations and hunting queries.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
3:36 pm, Juni 26, 2025
Wetter-Symbol 25°C
L: 23° | H: 26°
broken clouds
Luftfeuchtigkeit: 44 %
Druck: 1012 mb
Wind: 20 mph W
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 74%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:44 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
23° | 26°°C 0 mm 0% 17 mph 47 % 1016 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
17° | 28°°C 0 mm 0% 13 mph 62 % 1021 mb 0 mm/h
Sa. Juni 28 10:00 pm
Wetter-Symbol
18° | 28°°C 0 mm 0% 11 mph 89 % 1024 mb 0 mm/h
So. Juni 29 10:00 pm
Wetter-Symbol
19° | 32°°C 0 mm 0% 7 mph 76 % 1024 mb 0 mm/h
Mo. Juni 30 10:00 pm
Wetter-Symbol
22° | 35°°C 0 mm 0% 12 mph 68 % 1019 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
23° | 25°°C 0 mm 0% 17 mph 44 % 1012 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 24°°C 0 mm 0% 15 mph 41 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 9 mph 47 % 1016 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 8 mph 55 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 62 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 59 % 1020 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
22° | 22°°C 0 mm 0% 11 mph 51 % 1021 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 12 mph 45 % 1020 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,593.28
-0.46%
Ethereum(ETH)
€2,079.83
1.10%
Fesseln(USDT)
€0.86
-0.02%
XRP(XRP)
€1.82
-3.33%
Solana(SOL)
€121.68
-2.34%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.136127
-3.23%
Shiba Inu(SHIB)
€0.000009
-3.14%
Pepe(PEPE)
€0.000008
-6.23%
Nach oben scrollen