APT29, a threat actor associated with Russia, has recently been identified utilizing an unconventional strategy in cyber operations against valuable targets. By employing compromised Remote Desktop Protocol (RDP) setup files, they have repurposed a legitimate red team practice to conduct malicious activities.
These operations, primarily directed at governmental bodies, military establishments, research institutions, and entities based in Ukraine, involve the utilization of a “rogue RDP” approach that had been previously
These operations, primarily directed at governmental bodies, military establishments, research institutions, and entities based in Ukraine, involve the utilization of a “rogue RDP” approach that had been previously
