Monday, April 28, 2025
HomeCyber AttackMassive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Published on

SIEM as a Service

Follow Us on Google News

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors.

The attacks involve sending signed RDP configuration files to thousands of targets, aiming to compromise systems for intelligence gathering. 

The actor impersonates Microsoft employees and references other cloud providers to increase credibility, so users are advised to be cautious of suspicious emails and avoid opening attachments from unknown senders.

- Advertisement - Google News

Midnight Blizzard, a Russian-backed threat actor linked to the SVR, has employed a novel tactic by using a signed RDP configuration file to breach target devices.

This tactic, coupled with their traditional methods of account compromise and advanced exploitation, has allowed them to expand their access and evade detection. 

Malicious remote connection
Malicious remote connection

The group primarily targets government, diplomatic, NGO, and IT service provider entities in the US and Europe, aiming to collect sensitive intelligence. CERT-UA and Amazon have recently observed activity, highlighting the ongoing threat posed by Midnight Blizzard. 

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

Midnight Blizzard, a persistent threat actor, employs diverse tactics to gain initial access, including phishing, credential theft, and supply chain attacks

They leverage compromised on-premises environments to infiltrate cloud services and exploit service providers’ trust chains to target downstream customers. The group is known for using AD FS malware like FOGGYWEB and MAGICWEB. 

To launch a highly targeted spear-phishing campaign, it distributed emails disguised as legitimate communications from Microsoft, Amazon Web Services, and Zero Trust initiatives. 

When executed, these emails contained malicious RDP configuration files, which established a bidirectional connection between the victim’s device and an attacker-controlled server. 

This connection granted the attacker extensive access to the victim’s system, including sensitive data, network resources, and the ability to install malware for persistent control.

The victim opened a malicious RDP file, inadvertently establishing an RDP connection to an attacker-controlled server.

This granted the attacker unauthorized access to sensitive system information, including file systems, network drives, peripheral devices, authentication credentials, clipboard data, and POS devices.

Microsoft observed a Midnight Blizzard phishing campaign targeting specific sectors, such as government agencies, education, defense, and NGOs, in several countries, especially the UK, Europe, Australia, and Japan. 

It was a common strategy used in previous Midnight Blizzard attacks, and the emails were sent from email addresses belonging to legitimate organizations that had been compromised.

An analysis of the indicators of compromise (IOCs) reveals a potential phishing campaign targeting organizations with user accounts potentially located in Eastern Europe. 

The email senders include domains impersonating legitimate companies (.co.uk, .com.au) with recipients likely in government, military, and utility sectors (.gov, .mil, .energy). 

Using RDP filenames containing security and compliance keywords, such as AWS, IAM, SDE, and Zero Trust, can conceal the urgency. 

While the remote desktop connection attempts to target geographically relevant AWS cloud domains (ap-northeast-1, eu-central-1, us-east-1), further enhancing the campaign’s credibility. 

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface

A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface

A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...