Midnight Blizzard Strikes Again: New Tactics in Large-Scale Spear-Phishing Campaign Using RDP Files
The Government Emergency Response Team of Ukraine (CERT-UA) and Microsoft have issued alerts concerning an advanced spear-phishing campaign conducted by the threat actor Midnight Blizzard. The campaign targets public authorities, critical industries, and military organizations with emails themed around "integration with Amazon and Microsoft services" and "Zero Trust Architecture (ZTA)." The emails contain malicious RDP (Remote Desktop Protocol) configuration files that establish unauthorized RDP connections to attacker-controlled infrastructure. Attack Methodology: The attackers embed .rdp configuration files in their emails, which establish outbound connections to their servers upon execution. Key elements of this approach include: Local Resource Access: These RDP files allow attackers access to local resources such as disks, network resources, printers, COM ports, audio devices, and the clipboard. Potential Code Execution: CERT-UA reports that these files could allow the installation of third-party scripts or programs on the victim's machine, enabling further malware deployment. Impersonation of AWS Domains: Attackers use…