Russia’s ‘Midnight Blizzard’ hackers target government workers in novel info-stealing campaign

Avatar

Microsoft said Russia’s Foreign Intelligence Service (SVR) has targeted government workers over the last week with a tool that provides the hackers with full access to a victim’s device. 

In a blog post on Tuesday, Microsoft’s Threat Intelligence team said it has seen a Russian actor it tracks as Midnight Blizzard sending “highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors” since October 22. 

The campaign is ongoing and Microsoft tracked emails “sent to thousands of targets in over 100 organizations.” The emails contained configuration files for Remote Desktop Protocol (RDP) that are connected to servers controlled by the hackers.

RDP attachments “contained several sensitive settings that would lead to significant information exposure.”

“Once the target system was compromised, it connected to the actor-controlled server and bidirectionally mapped the targeted user’s local device’s resources to the server,” Microsoft said, adding that a wide range of resources, including printers and clipboard contents, could be sent to the server.

Even security keys and point of sale devices could be affected by opening the RDP attachment. The access would allow hackers to install malware, map the victim’s network, install other tools and gain access to credentials.

Microsoft said it has seen the attackers target people in dozens of countries including the United Kingdom, Europe, Australia, and Japan. The hackers sent the phishing emails to email addresses “gathered during previous compromises.”

In some of the emails, the hackers tried to get victims to open them by impersonating Microsoft employees and others used social engineering lures relating to Microsoft, Amazon Web Services (AWS) and the concept of zero trust.

The campaign was particularly noteworthy because the use of RDP configuration files was a novel advancement in Midnight Blizzard’s tactics. Microsoft noted that both Amazon and the Government Computer Emergency Response Team of Ukraine have seen similar activity.

Last week, Amazon published a security brief warning that Russia’s Foreign Intelligence Service was targeting government agencies, companies, and militaries with a phishing campaign aimed at “stealing credentials from Russian adversaries.”

The hackers, which Amazon calls APT29, sent Ukrainian language phishing emails to “significantly more targets than their typical, narrowly targeted approach.” 

“Some of the domain names they used tried to trick the targets into believing the domains were AWS domains (they were not), but Amazon wasn’t the target, nor was the group after AWS customer credentials,” Amazon Chief Information Security Officer CJ Moses said.

“Rather, APT29 sought its targets’ Windows credentials through Microsoft Remote Desktop. Upon learning of this activity, we immediately initiated the process of seizing the domains APT29 was abusing which impersonated AWS in order to interrupt the operation.”

SVR hackers were previously behind a deep breach of Microsoft systems last November that gave them access to the company’s corporate email environment — also exposing emails from several U.S. federal agencies that may have contained authentication details or credentials

In addition to more recent attacks on software companies like TeamViewer, the SVR has been behind some of the most consequential cyberattacks in U.S. history — including the 2020 SolarWinds hack and the 2016 attack on the Democratic National Committee.

CybercrimeGovernmentNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

‘All servers’ for Redline and Meta infostealers hacked by Dutch police and FBI

Next Post

Six senators tell Biden administration UN cybercrime treaty must be changed

Related Posts

AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

AI is changing everything — from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break — if you’re not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of non-human identities — API keys, service accounts, OAuth tokens — silently operating in the background. And here’s
Avatar
Read More

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and
Avatar
Read More