Hackers Exploiting Malicious RDP Configuration Files to Target Windows Servers

A new cultured phishing movement targeting government agencies, industrial companies, and military units in Ukraine and potentially other nations has been found. The Computer Emergency Response Team of Ukraine (CERT-UA) published an attention on October 22, 2024, cautioning of the mass distribution of negative emails including weaponized Remote Desktop Protocol (RDP) setup files.

The phishing emails, hidden as communications about incorporating Amazon and Microsoft services and executing Zero Trust Architecture (ZTA), contain connected .rdp files. When unlocked, these files establish an outgoing RDP reference to the assailants’ server, giving comprehensive access to the victim’s computer resources.

According to CERT-UA, the negative RDP links not only supply access to local disks, network resources, printers, and other gadgets but also create situations for executing unauthorized programs or scripts on the compromised system. This level of access poses a severe safety hazard to involved associations.

 

The movement’s scope seems to rise above Ukraine, with safety associations in other nations conveying similar actions. Analysis of associated field names indicates that preparation for these cyberattacks began as early as August 2024, demonstrating a well-planned and potentially long-term process.

To mitigate the hazard, CERT-UA suggests several specialized measures:

  1. Blocking .rdp files at the email gateway
  2. Stopping users from managing .rdp files (with required exceptions)
  3. Configuring firewalls to restrict RDP links formed by mstsc.exe to internet resources
  4. Executing group approaches to prohibit resource redirection via RDP

Safety groups are recommended to prevent network logs for relations with this movement’s specified IP addresses and domain names. Also, CERT-UA implies investigating all outgoing network links on port 3389/TCP for the present month to determine possible compromises. This attack emphasizes the continuing threats associated with RDP, a protocol that cybercriminals have increasingly manipulated, particularly since the rise of remote work.

Associations are encouraged to examine their remote access policies and implement strong safety standards to guard against such refined phishing endeavors. As the danger landscape continues to evolve, cybersecurity professionals highlight the significance of user education, powerful email filtering, and exhaustive network monitoring to protect against these types of attacks.