Article Details
Scrape Timestamp (UTC): 2024-10-25 16:43:45.198
Original Article Text
Click to Toggle View
Amazon seizes domains used in rogue Remote Desktop campaign to steal data. Amazon has seized domains used by the Russian APT29 hacking group in targeted attacks against government and military organizations to steal Windows credentials and data using malicious Remote Desktop Protocol connection files. APT29, also known as "Cozy Bear" and "Midnight Blizzard," is a Russian state-sponsored cyber-espionage group linked to Russia's Foreign Intelligence Service (SVR). Amazon clarifies that although the phishing pages APT29 used were made to appear as AWS domains, neither Amazon, nor credentials for its cloud platform were the direct targets of these attacks. "Some of the domain names they used tried to trick the targets into believing the domains were AWS domains (they were not), but Amazon wasn't the target, nor was the group after AWS customer credentials," reads the announcement. "Rather, APT29 sought its targets' Windows credentials through Microsoft Remote Desktop." "Upon learning of this activity, we immediately initiated the process of seizing the domains APT29 was abusing which impersonated AWS in order to interrupt the operation." The threat actors are known for highly sophisticated attacks targeting governments, think tanks, and research institutions globally, often using phishing and malware to steal sensitive information. Targeting organizations worldwide Although APT29's recent campaign had a significant impact in Ukraine, where it was first discovered, it was broad in scope, targeting multiple countries considered Russian adversaries. Amazon notes that in this particular campaign, APT29 sent phishing emails to a much larger number of targets than they usually do, following the opposite approach of their typical "narrow targeting" strategy. Ukraine's Computer Emergency Response Team (CERT-UA) published an advisory about these "Rogue RDP" attachments to warn about the mass email activity, which they track under 'UAC-0215.' The messages used the topic of addressing 'integration' issues with Amazon and Microsoft services and implementing a 'zero trust' cybersecurity architecture (Zero Trust Architecture, ZTA). The emails included RDP (Remote Desktop Protocol) connection files with names like "Zero Trust Security Environment Compliance Check.rdp" that automatically initiated connections to malicious servers when opened. As can be seen from the image of one of these RDP connection profiles above, they shared all local resources with the attacker-controlled RDP server, including: Moreover, UA-CERT says they can also be used to execute unauthorized programs or scripts on the compromised device. While Amazon says that this campaign was utilized to steal Windows credentials, as the target's local resources were shared with the attacker's RDP server, it would also have allowed the threat actors to steal data directly from the shared devices. This includes all data stored on the target's hard drives, Windows clipboard, and mapped network shares. CERT-UA recommends scrutinizing network interaction logs for IP addresses shared in the IoC section of their bulletin to detect possible signs of attacks or a breach. Additionally, the below measures are recommended for reducing the attack surface: APT29 remains one of Russia's most capable cyber threats, recently becoming known for using exploits only available to spyware vendors. In the past year, it was revealed that the threat actors hacked important software vendors like TeamViewer, Microsoft, and Hewlett Packard Enterprise. Western intelligence services warned earlier this month about APT29 leveraging Zimbra and JetBrains TeamCity servers flaws "en masse," to breach important organizations worldwide.
Daily Brief Summary
Russian APT group APT29, linked to the SVR, targeted government and military entities using fake AWS domains to steal Windows credentials via malicious Remote Desktop Protocol (RDP) files.
Amazon seized domains impersonating AWS in order to disrupt the operations of APT29, clarifying that their platform and customer credentials were not the actual targets.
The campaign significantly impacted Ukraine but also targeted other countries considered adversaries by Russia, employing a wider than usual range of phishing targets.
Phishing emails discussed 'integration' issues between Amazon and Microsoft, and promoted implementing a 'zero trust' security architecture, leading recipients to malicious RDP connection files.
When the RDP files were opened, they connected to attacker-controlled servers, sharing all local resources including hard drives and network shares, potentially leading to unauthorized program executions.
Ukraine’s CERT-UA issued warnings about the Rogue RDP attachments and recommended scrutinizing network interaction logs for signs of attacks or breaches.
APT29 was recently revealed to have exploited software vulnerabilities in products from companies like TeamViewer and Microsoft among others, indicating a significant threat capability and broad operational scope.