CyberSecurity updates
2024-12-26 18:14:51 Pacfic

Earth Koshchei RDP Attacks Exploit Red Team - 8d
Read more: gbhackers.com

Earth Koshchei, also known as APT29 and Midnight Blizzard, has launched a sophisticated cyber espionage campaign exploiting Remote Desktop Protocol (RDP) servers. The threat actor employs a "rogue RDP" technique, utilizing malicious RDP configuration files delivered through spear-phishing emails. These files redirect victims’ connections through a network of 193 RDP relays, masking their traffic with VPNs, TOR, and residential proxies. This methodology, which repurposes legitimate red team tools, targets government agencies, military organizations, think tanks, academic researchers, and Ukrainian entities, allowing for potential data exfiltration and malware installation.

Trend Micro researchers highlighted that this attack does not require malware installation, relying on exploiting native RDP features. Victims unwittingly grant partial control of their machines to the attackers, who can then deploy malicious scripts, alter system settings, and exfiltrate sensitive data via a PyRDP proxy. The attacker's infrastructure included over 200 registered domain names and 34 rogue RDP servers, many of which mimicked legitimate organizations, adding to the deceptive nature of the attack. This campaign, which saw a peak on October 22nd, underscores the increasing sophistication of cyber threats and the need for robust security measures to defend against such attacks.