Security

Cyber-crime

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel


Microsoft says a mass phishing campaign by Russia's foreign intelligence services (SVR) is now in its second week, and the spies are using a novel info-gathering technique.

First spotted on October 22, Microsoft said in a report published Tuesday that the spearphishing attempts are "ongoing" and targeting governments, NGOs, academia, and defense organizations.

Infoseccers at the Windows-maker said Midnight Blizzard, an advanced persistent threat (APT) group widely attributed to Russia's SVR, was behind the attacks. The phishing emails targeted thousands of individuals at more than 100 organizations – a deviation from the group's usual, highly targeted approach – and included remote desktop protocol (RDP) configuration files as attachments.

These RDP config files were especially interesting to researchers. Midnight Blizzard (or APT29, Cozy Bear, or any of the other various monikers the industry assigns to the group) hasn't ever used these as an initial access method before.

Should a victim run the files, an RDP connection to the Midnight Blizzard-owned system would be established. The configuration files were crafted in such a way that their settings allowed for "significant information exposure" on the victim's side, Microsoft said.

"Once the target system was compromised, it connected to the actor-controlled server and bidirectionally mapped the targeted user's local device's resources to the server. Resources sent to the server may include, but are not limited to, all logical hard disks, clipboard contents, printers, connected peripheral devices, audio, and authentication features and facilities of the Windows operating system, including smart cards. 

"This access could enable the threat actor to install malware on the target's local drive(s) and mapped network share(s), particularly in AutoStart folders, or install additional tools such as remote access trojans (RATs) to maintain access when the RDP session is closed. The process of establishing an RDP connection to the actor-controlled system may also expose the credentials of the user signed in to the target system."

Microsoft's findings echo those of Ukraine's Computer Emergency Response Team (CERT-UA) and Amazon, both of which drew attention to Russia's activity closer to the campaign's October 22 start date.

The emails were composed in the Ukrainian language and primarily targeted organizations in the UK, Europe, Australia, and Japan – the usual territories in Midnight Blizzard's crosshairs. In some, the attackers presented as Microsoft employees in a bid to increase the feeling of legitimacy, while others featured impersonations of other cloud providers.

CERT-UA said the subject lines were themed around integration issues with Amazon and Microsoft's services, and the implementation of zero trust architectures. It added that the domain names associated with the attack infrastructure indicated the campaign may have been planned since at least August this year.

Neither Microsoft, Amazon, nor CERT-UA mentioned anything about the degree to which these attacks saw success, whether any kind of malware was installed, or what kinds of information they were targeting.

However, we know from previous Midnight Blizzard intrusions that the group typically goes after sensitive files that can inform Russian intelligence operations.

The group's biggest success, at least of late, was its breach of Microsoft's own systems, disclosed by the tech giant back in January. Not only was it a surprise breach of the company's own systems, but the scale and sensitivity of the data it accessed stole the headlines for weeks and months after.

It was infamously revealed months later that US government emails were accessed as a result of Midnight Blizzard's Microsoft breach. The cyberspies had access to email correspondence between Microsoft and its customers which contained authentication details that were then used in attempts to breach said customers.

This, of course, all came just a few months after a separate Microsoft intrusion – this time at the hands of China's cyberspooks. It was revealed in September 2023 that US government emails were stolen by Beijing following a successful attack on Exchange Online.

A damning review of the incident, published earlier this year and carried out by the Cyber Safety Review Board (CSRB), concluded that a "cascade of Microsoft's avoidable errors" led to the break-in.

In the same year but not believed to be related to the intrusion at Microsoft, the likes of HPE and TeamViewer also disclosed significant breaches attributed to the same unit inside Russia's SVR. ®

Send us news
18 Comments

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list

The latest in an unusual change of fortune for group once protected by the Kremlin

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware

Threatened with life in prison, Kyiv charity worker gives middle finger to state spies

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Severity of the risk facing the UK is widely underestimated, NCSC annual review warns

National cyber emergencies increased threefold this year

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'