Russian hackers deliver malicious RDP configuration files to thousands

Share:

Midnight Blizzard – a cyber espionage group that has been linked to the Russian Foreign Intelligence Service (SVR) – is targeting government, academia, defense, and NGO workers with phishing emails containing a signed Remote Desktop Protocol (RDP) configuration file.

“Based on our investigation of previous Midnight Blizzard spear-phishing campaigns, we assess that the goal of this operation is likely intelligence collection,” Microsoft’s threat analysts say.

Midnight Blizzard

Midnight Blizzard (aka Cozy Bear, APT29, and UNC2452) has been implicated in a number of high-profile attacks in the last decade or so:

  • The 2014 compromise of US State Department and White House networks
  • The 2016 compromise of the US Democratic National Committee
  • Breaches following the 2020 compromise of SolarWinds’ Orion software
  • The 2024 breach of Microsoft and HPE corporate maliboxes, and others.

“Midnight Blizzard is consistent and persistent in its operational targeting, and its objectives rarely change,” Microsoft notes.

“It uses diverse initial access methods, including spear phishing, stolen credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers’ trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known as FoggyWeb and MagicWeb.”

The spear-phishing campaign

The group’s spear-phishing tactics are always changing. Last year, for example, have been spotted trying to phish government employees via Microsoft Teams.

In this latest campaign, which is still ongoing, Midnight Blizzard tries to trick targets into downloading and opening a RDP configuration file (.rdp).

The emails are sent from legitimate email addresses that were compromised in previous attacks. The thousands of targeted recipients are employees of governmental agencies, higher education, defense, and non-governmental organizations in dozens of countries, including the UK, Europe, Australia, and Japan.

As the Ukrainian CERT team recently warned, running the malicious file will establish an outgoing RDP connection with the attackers’ server, allowing the server access to disks, network resources, printers, COM ports, audio devices, the clipboard and other resources (including credentials) on the targets’ computer, as well as put into place technical prerequisites for running third-party programs or scripts.

Midnight Blizzard RDP file

The prompts shown when running the malicios file (Source: Microsoft)

“The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust,” Microsoft says.

Amazon shared that some of the domain names they used tried to trick the targets into believing the domains were AWS domains, and that the company initiated the process of seizing them.

CERT-UA advised blocking RDP files on the mail gateway, blocking users from running RDP files (with exeptions), and configuring the firewall to limit the possibility of establishing RDP connections by the mstsc.exe program to resources on the Internet.

Microsoft has provided indicators of compromise related to this campaign, as well as mitigations and hunting queries.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:16 pm, Jun 22, 2025
weather icon 20°C
L: 18° | H: 21°
few clouds
Humidity: 68 %
Pressure: 1011 mb
Wind: 12 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 20%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
18° | 21°°C 0.66 mm 66% 14 mph 78 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
13° | 24°°C 0.2 mm 20% 14 mph 81 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 28°°C 0 mm 0% 11 mph 88 % 1014 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 25°°C 1 mm 100% 15 mph 84 % 1018 mb 0 mm/h
Fri Jun 27 10:00 pm
weather icon
15° | 28°°C 0 mm 0% 15 mph 70 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
19° | 19°°C 0 mm 0% 13 mph 70 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 18°°C 0.66 mm 66% 14 mph 78 % 1011 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.2 mm 20% 13 mph 64 % 1013 mb 0 mm/h
Tomorrow 10:00 am
weather icon
18° | 18°°C 0 mm 0% 13 mph 45 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
20° | 20°°C 0 mm 0% 13 mph 32 % 1014 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
23° | 23°°C 0 mm 0% 14 mph 30 % 1014 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
21° | 21°°C 0 mm 0% 14 mph 40 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 11 mph 55 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€86,323.96
-3.06%
Ethereum(ETH)
€1,900.45
-8.69%
Tether(USDT)
€0.87
0.01%
XRP(XRP)
€1.71
-5.55%
Solana(SOL)
€112.59
-6.18%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.128795
-6.30%
Shiba Inu(SHIB)
€0.000009
-5.76%
Pepe(PEPE)
€0.000008
-9.50%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top