Midnight Blizzard Strikes Again: APT29’s Comedic Take on Cyber Espionage!

APT29, aka Midnight Blizzard, is using PyRDP for MiTM attacks, with 193 RDP proxy servers to steal data and install malicious payloads. Their targets? Governments, military, and IT sectors in the US, France, and more. Remember, always question that RDP email invite—it could be a trap with a side of malware!

Pro Dashboard

Hot Take:

Ah, APT29, the cyber equivalent of a midnight snack gone wrong! This group is like the Houdini of hacking, using remote desktop protocol (RDP) like a magician uses a top hat. With 193 proxy servers, they’re pulling off a MiTM act that could rival any circus performance. Who knew espionage could be so… remote?

Key Points:

  • APT29, aka “Midnight Blizzard,” is using 193 RDP proxy servers for MiTM attacks.
  • The attacks target government, military, diplomatic, IT, and telecom sectors.
  • PyRDP, a Python tool, is used to intercept and manipulate RDP sessions.
  • Victims are tricked through phishing emails leading to rogue RDP servers.
  • Evasion tactics include using VPNs, TOR exit nodes, and residential proxies.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?