Threat Intelligence

New Russia-linked cyberespionage campaign abuses Windows RDP

System hacked warning alert on laptop computer. Cyber attack on computer network, virus, spyware, malware or malicious software. Cyber security and cybercrime concept. System security technology (3)

Attacks exploiting the Windows Remote Desktop Protocol have been launched by Russia-nexus threat operation UNC5837 against European government and military organizations as part of a cyberespionage-focused phishing campaign discovered in October, reports Cybernews.

Malicious emails purporting to be from a joint Amazon, Microsoft, and Ukrainian government project were leveraged by UNC5837 to distribute an .rdp file dubbed "AWS Secure Storage Connection Stability Test," which when executed triggers an outbound RDP session and another remote desktop window displayed by RemoteApp, according to a Google Threat Intelligence Group report. Attackers would then be able to use the ongoing RDP session to infiltrate local drives and clipboards, from which various sensitive details could be exfiltrated, as well as compromise audio devices, printers, ports, and smartcards, said Google Threat Intelligence Group researchers, who suggested the potential abuse of the open-source RDP proxy PyRDP as part of the covert intrusions. Such findings come after more than half of ransomware attacks were reported by Malwarebytes to have stemmed from RDP compromise.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds