Amazon has seized domains utilized by the Russian APT29 hacking group in focused assaults towards authorities and navy organizations to steal Home windows credentials and knowledge utilizing malicious Distant Desktop Protocol connection information.
APT29, often known as “Cozy Bear” and “Midnight Blizzard,” is a Russian state-sponsored cyber-espionage group linked to Russia’s Overseas Intelligence Service (SVR).
Amazon clarifies that though the phishing pages APT29 used had been made to seem as AWS domains, neither Amazon, nor credentials for its cloud platform had been the direct targets of those assaults.
“Among the domains they used tried to trick the targets into believing the domains had been AWS domains (they weren’t), however Amazon wasn’t the goal, nor was the group after AWS buyer credentials,” reads the announcement.
“Slightly, APT29 sought its targets’ Home windows credentials by way of Microsoft Distant Desktop.”
“Upon studying of this exercise, we instantly initiated the method of seizing the domains APT29 was abusing which impersonated AWS in an effort to interrupt the operation.”
The menace actors are identified for extremely subtle assaults focusing on governments, assume tanks, and analysis establishments globally, usually utilizing phishing and malware to steal delicate data.
Focusing on organizations worldwide
Though APT29’s current marketing campaign had a big impression in Ukraine, the place it was first found, it was broad in scope, focusing on a number of nations thought-about Russian adversaries.
Amazon notes that on this specific marketing campaign, APT29 despatched phishing emails to a a lot bigger variety of targets than they normally do, following the other method of their typical “slender focusing on” technique.
Ukraine’s Laptop Emergency Response Group (CERT-UA) revealed an advisory about these “Rogue RDP” attachments to warn in regards to the mass e mail exercise, which they monitor below ‘UAC-0215.’
The messages used the subject of addressing ‘integration’ points with Amazon and Microsoft providers and implementing a ‘zero belief’ cybersecurity structure (Zero Belief Structure, ZTA).
The emails included RDP (Distant Desktop Protocol) connection information with names like “Zero Belief Safety Atmosphere Compliance Verify.rdp” that robotically initiated connections to malicious servers when opened.

Supply: BleepingComputer
As will be seen from the picture of one among these RDP connection profiles above, they shared all native sources with the attacker-controlled RDP server, together with:
- Native disks and information
- Community sources
- Printers
- COM ports
- Audio gadgets
- Clipboard
Furthermore, UA-CERT says they can be used to execute unauthorized applications or scripts on the compromised system.

Supply: CERT-UA
Whereas Amazon says that this marketing campaign was utilized to steal Home windows credentials, because the goal’s native sources had been shared with the attacker’s RDP server, it could even have allowed the menace actors to steal knowledge straight from the shared gadgets.
This consists of all knowledge saved on the goal’s exhausting drives, Home windows clipboard, and mapped community shares.
CERT-UA recommends scrutinizing community interplay logs for IP addresses shared within the IoC part of their bulletin to detect doable indicators of assaults or a breach.
Moreover, the beneath measures are really helpful for lowering the assault floor:
- Block’ .rdp’ information on the mail gateway.
- Stop customers from launching any ‘.rdp’ information when not wanted.
- Configure firewall settings to limit RDP connections from the mstsc.exe program to exterior community sources.
- Configure group insurance policies to disable useful resource redirection through RDP (‘Distant Desktop Providers’ -> ‘Distant Desktop Session Host’ -> ‘Machine and Useful resource Redirection’ -> ‘Don’t permit…’).
APT29 stays one among Russia’s most succesful cyber threats, just lately changing into identified for utilizing exploits solely accessible to spyware and adware distributors.
Up to now 12 months, it was revealed that the menace actors hacked necessary software program distributors like TeamViewer, Microsoft, and Hewlett Packard Enterprise.
Western intelligence providers warned earlier this month about APT29 leveraging Zimbra and JetBrains TeamCity servers flaws “en masse,” to breach necessary organizations worldwide.