Amazon beschlagnahmt Domains, die in einer bösartigen Remote-Desktop-Kampagne zum Datendiebstahl verwendet wurden

Teilen:

Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files.

APT29, also known as “Cozy Bear” and “Midnight Blizzard,” is a Russian state-sponsored cyber-espionage group linked to Russia’s Foreign Intelligence Service (SVR).

Amazon clarifies that although the phishing pages APT29 used were made to appear as AWS domains, neither Amazon, nor credentials for its cloud platform were the direct targets of these attacks.

“Some of the domain names they used tried to trick the targets into believing the domains were AWS domains (they were not), but Amazon wasn’t the target, nor was the group after AWS customer credentials,” reads the announcement.

“Rather, APT29 sought its targets’ Windows credentials through Microsoft Remote Desktop.”

“Upon learning of this activity, we immediately initiated the process of seizing the domains APT29 was abusing which impersonated AWS in order to interrupt the operation.”

The threat actors are known for highly sophisticated attacks targeting governments, think tanks, and research institutions globally, often using phishing and malware to steal sensitive information.

Targeting organizations worldwide

Although APT29’s recent campaign had a significant impact in Ukraine, where it was first discovered, it was broad in scope, targeting multiple countries considered Russian adversaries.

Amazon notes that in this particular campaign, APT29 sent phishing emails to a much larger number of targets than they usually do, following the opposite approach of their typical “narrow targeting” strategy.

Ukraine’s Computer Emergency Response Team (CERT-UA) published an advisory about these “Rogue RDP” attachments to warn about the mass email activity, which they track under ‘UAC-0215.’

The messages used the topic of addressing ‘integration’ issues with Amazon and Microsoft services and implementing a ‘zero trust’ cybersecurity architecture (Zero Trust Architecture, ZTA).

The emails included RDP (Remote Desktop Protocol) connection files with names like “Zero Trust Security Environment Compliance Check.rdp” that automatically initiated connections to malicious servers when opened.

Malicious RDP configuration screen
Malicious RDP configuration screen
Quelle: BleepingComputer

As can be seen from the image of one of these RDP connection profiles above, they shared all local resources with the attacker-controlled RDP server, including:

  • Local disks and files
  • Network resources
  • Printers
  • COM ports
  • Audio devices
  • Clipboard

Moreover, UA-CERT says they can also be used to execute unauthorized programs or scripts on the compromised device.

Shared drives and devices are redirected to the attacker's RDP server
Shared drives and devices are redirected to the attacker’s RDP server
Source: CERT-UA

While Amazon says that this campaign was utilized to steal Windows credentials, as the target’s local resources were shared with the attacker’s RDP server, it would also have allowed the threat actors to steal data directly from the shared devices.

This includes all data stored on the target’s hard drives, Windows clipboard, and mapped network shares.

CERT-UA recommends scrutinizing network interaction logs for IP addresses shared in the IoC section of their bulletin to detect possible signs of attacks or a breach.

Additionally, the below measures are recommended for reducing the attack surface:

  1. Block’ .rdp’ files at the mail gateway.
  2. Prevent users from launching any ‘.rdp’ files when not needed.
  3. Configure firewall settings to restrict RDP connections from the mstsc.exe program to external network resources.
  4. Configure group policies to disable resource redirection via RDP (‘Remote Desktop Services’ -> ‘Remote Desktop Session Host’ -> ‘Device and Resource Redirection’ -> ‘Do not allow…’).

APT29 remains one of Russia’s most capable cyber threats, recently becoming known for using exploits only available to spyware vendors.

In the past year, it was revealed that the threat actors hacked important software vendors like TeamViewer, Microsoft, and Hewlett Packard Enterprise.

Western intelligence services warned earlier this month about APT29 leveraging Zimbra and JetBrains TeamCity servers flaws “en masse,” to breach important organizations worldwide.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:33 pm, Juni 26, 2025
Wetter-Symbol 21°C
L: 20° | H: 22°
wenige Wolken
Luftfeuchtigkeit: 45 %
Druck: 1015 mb
Wind: 17 mph W
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 11%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:44 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
20° | 22°°C 0 mm 0% 9 mph 46 % 1016 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
15° | 28°°C 1 mm 100% 13 mph 80 % 1021 mb 0 mm/h
Sa. Juni 28 10:00 pm
Wetter-Symbol
18° | 28°°C 0 mm 0% 11 mph 87 % 1025 mb 0 mm/h
So. Juni 29 10:00 pm
Wetter-Symbol
19° | 32°°C 0 mm 0% 6 mph 79 % 1025 mb 0 mm/h
Mo. Juni 30 10:00 pm
Wetter-Symbol
22° | 36°°C 0 mm 0% 15 mph 66 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
19° | 20°°C 0 mm 0% 9 mph 46 % 1016 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
17° | 19°°C 0 mm 0% 9 mph 49 % 1018 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
15° | 15°°C 1 mm 100% 7 mph 80 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
15° | 15°°C 0.72 mm 72% 8 mph 69 % 1021 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 57 % 1020 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 11 mph 44 % 1020 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
28° | 28°°C 0 mm 0% 12 mph 40 % 1019 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 13 mph 37 % 1020 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,921.63
-0.33%
Ethereum(ETH)
€2,080.45
-0.06%
Fesseln(USDT)
€0.86
-0.02%
XRP(XRP)
€1.82
-3.41%
Solana(SOL)
€121.46
-1.68%
USDC(USDC)
€0.85
0.01%
Dogecoin(DOGE)
€0.137111
-3.34%
Shiba Inu(SHIB)
€0.000009
-3.71%
Pepe(PEPE)
€0.000008
-4.15%
Nach oben scrollen