Infamous Russian-linked threat actor Midnight Blizzard has been targeting US officials with spear phishing attacks across a range of government and non-government sectors, new research has claimed..
Findings released by Microsoft Threat Intelligence state Midnight Blizzard has been using these attacks to gather information since first being observed on October 22.
These campaigns have also been observed and confirmed by Amazon and the Government Computer Emergency Response Team of Ukraine.
Highly targeted spear phishing
The latest spear phishing attacks utilize a strong social engineering aspect, relying on Microsoft, Amazon Web Services (AWS) and Zero Trust hooks to lure targets into opening Remote Desktop Protocol (RPD) loaded files attached to emails. These files effectively allow Midnight Blizzard to control features and resources of the target system through a remote server.
Midnight Blizzard would also be able to conduct significant information gathering on afflicted devices through mapping the target’s local device resources, including information on “all logical hard disks, clipboard contents, printers, connected peripheral devices, audio, and authentication features and facilities of the Windows operating system, including smart cards.”
This mapping would occur each time the target device connects to the RDP server. Through the connection, Midnight Blizzard can install remote access trojans (RAT) to establish persistent access when the device is not connected to the RDP server.
As a result, Midnight Blizzard would be able to install malware on both the target device and other devices on the same network, alongside the potential for credential theft during the RDP connection.
The campaign has so far targeted officials in governmental agencies, higher education, defense, and non-governmental organizations across the UK, Europe, Australia and Japan. You can see the full details on Microsoft’s mitigation measures here.