Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » APT29 hackers target high-value victims with fake RDP and PyRDP servers
Global Security

APT29 hackers target high-value victims with fake RDP and PyRDP servers

AdminBy AdminDecember 18, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 18, 2024Ravi LakshmananCyber ​​espionage / malware

Russia-linked threat actor APT29 has been seen repurposing legitimate red teaming attack methodology as part of cyberattacks using malicious Remote Desktop Protocol (RDP) configuration files.

Activities targeting governments and armed forces, think tanks, academic researchers, and Ukrainian organizations entail adopting the “rogue RDP” method that was previously documented Black Hills Information Security in 2022, Trend Micro report says.

“A victim of this technique would give partial control of their machine to an attacker, potentially leading to data leakage and the installation of malware,” researchers Feike Hackebord and Steven Hilt said.

Cyber ​​security

The cyber security company is tracking a threat group under its own alias Earth Koshchei, saying preparations for the campaign began as early as August 7-8, 2024. There were also RDP campaigns spotlights The Emergency Response Team of Ukraine (CERT-UA), Microsoft and Amazon Web Services (AWS) back in October.

The phishing emails were designed to trick recipients into running a malicious RDP configuration file attached to the message, causing their machines to connect to a foreign RDP server through one of the group’s 193 RDP relays. An estimated 200 known victims were killed in one day, indicating the scale of the campaign.

The attack method outlined by Black Hill involves using an open source project called PyRDP – described as a Python-based “Monster-in-the-Middle (MitM) tool and library” – in front of an actually adversary-controlled RDP server to minimize the risk of detection.

Therefore, when a victim opens an RDP file codenamed HUSTLECON from an email, it initiates an outbound RDP connection to the PyRDP relay, which then redirects the session to the malicious server.

“Once a connection is established, the fake server mimics the behavior of a legitimate RDP server and uses the session to perform various malicious activities,” the researchers said. “The primary attack vector involves the attacker deploying malicious scripts or modifying system settings on the victim’s machine.”

To top it all off, the PyRDP proxy allows an attacker to gain access to the victim’s systems, perform file operations, and inject malicious payloads. The attack culminates in the threat actor using a compromised RDP session to steal sensitive data, including credentials and other private information, via a proxy server.

What’s unique about this attack is that data collection is facilitated through a malicious configuration file without the need to deploy custom malware, allowing threat actors to fly under radar.

Cyber ​​security

Another characteristic worth mentioning is the use of anonymization layers such as TOR exit nodes to manage RDP servers, as well as residential proxy providers and commercial VPN services to access legitimate mail servers that were used to send phishing emails.

“Tools like PyRDP enhance the attack by allowing RDP connections to be intercepted and manipulated,” the researchers added. “PyRDP can automatically scan shared drives redirected by the victim and store their contents locally on the attacker’s machine, facilitating seamless data exfiltration.”

“Earth Koshchei uses new methodologies for its espionage campaigns over time. Not only do they pay close attention to old and new vulnerabilities that help them gain initial access, but they also look at the methodologies and tools that red teams develop.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.