Russian hackers deliver malicious RDP configuration files to thousands

Share:

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Protocol (RDP) configuration file.

“Based on our investigation of previous Midnight Blizzard spear-phishing campaigns, we assess that the goal of this operation is likely intelligence collection,” Microsoft’s threat analysts say.

Midnight Blizzard

Midnight Blizzard (aka Cozy Bear, APT29, and UNC2452) has been implicated in a number of high-profile attacks in the last decade or so:

  • The 2014 compromise of US State Department and White House networks
  • The 2016 compromise of the US Democratic National Committee
  • Breaches following the 2020 compromise of SolarWinds’ Orion software
  • The 2024 breach of Microsoft and HPE corporate maliboxes, and others.

“Midnight Blizzard is consistent and persistent in its operational targeting, and its objectives rarely change,” Microsoft notes.

“It uses diverse initial access methods, including spear phishing, stolen credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers’ trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known as FoggyWeb and MagicWeb.”

The spear-phishing campaign

The group’s spear-phishing tactics are always changing. Last year, for example, have been spotted trying to phish government employees via Microsoft Teams.

In this latest campaign, which is still ongoing, Midnight Blizzard tries to trick targets into downloading and opening a RDP configuration file (.rdp).

The emails are sent from legitimate email addresses that were compromised in previous attacks. The thousands of targeted recipients are employees of governmental agencies, higher education, defense, and non-governmental organizations in dozens of countries, including the UK, Europe, Australia, and Japan.

As the Ukrainian CERT team recently warned, running the malicious file will establish an outgoing RDP connection with the attackers’ server, allowing the server access to disks, network resources, printers, COM ports, audio devices, the clipboard and other resources (including credentials) on the targets’ computer, as well as put into place technical prerequisites for running third-party programs or scripts.

Midnight Blizzard RDP file

The prompts shown when running the malicios file (Source: Microsoft)

“The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust,” Microsoft says.

Amazon shared that some of the domain names they used tried to trick the targets into believing the domains were AWS domains, and that the company initiated the process of seizing them.

CERT-UA advised blocking RDP files on the mail gateway, blocking users from running RDP files (with exeptions), and configuring the firewall to limit the possibility of establishing RDP connections by the mstsc.exe program to resources on the Internet.

Microsoft has provided indicators of compromise related to this campaign, as well as mitigations and hunting queries.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:34 pm, Jan 31, 2025
weather icon 6°C
L: 6° | H: 7°
overcast clouds
Humidity: 91 %
Pressure: 1029 mb
Wind: 7 mph ESE
Wind Gust: 8 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:40 am
Sunset: 4:47 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 9:00 pm
weather icon
6° | 7°°C 0 mm 0% 8 mph 90 % 1030 mb 0 mm/h
Sun Feb 02 9:00 pm
weather icon
2° | 8°°C 0 mm 0% 6 mph 86 % 1026 mb 0 mm/h
Mon Feb 03 9:00 pm
weather icon
2° | 9°°C 0 mm 0% 5 mph 92 % 1027 mb 0 mm/h
Tue Feb 04 9:00 pm
weather icon
3° | 9°°C 0 mm 0% 9 mph 93 % 1028 mb 0 mm/h
Wed Feb 05 9:00 pm
weather icon
4° | 8°°C 0.51 mm 51% 7 mph 86 % 1045 mb 0 mm/h
Tomorrow 12:00 am
weather icon
5° | 6°°C 0 mm 0% 5 mph 90 % 1028 mb 0 mm/h
Tomorrow 3:00 am
weather icon
5° | 6°°C 0 mm 0% 6 mph 84 % 1029 mb 0 mm/h
Tomorrow 6:00 am
weather icon
5° | 5°°C 0 mm 0% 4 mph 80 % 1029 mb 0 mm/h
Tomorrow 9:00 am
weather icon
5° | 5°°C 0 mm 0% 3 mph 79 % 1030 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
6° | 6°°C 0 mm 0% 8 mph 71 % 1029 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
6° | 6°°C 0 mm 0% 6 mph 73 % 1027 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
6° | 6°°C 0 mm 0% 6 mph 73 % 1027 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
4° | 4°°C 0 mm 0% 6 mph 82 % 1026 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€98,771.61
-2.71%
Ethereum(ETH)
€3,199.15
1.94%
XRP(XRP)
€2.93
-2.98%
Tether(USDT)
€0.97
-0.04%
Solana(SOL)
€222.99
-4.06%
USDC(USDC)
€0.97
0.01%
Dogecoin(DOGE)
€0.316711
-1.37%
Shiba Inu(SHIB)
€0.000018
0.53%
Pepe(PEPE)
€0.000014
6.58%
Scroll to Top