Midnight Blizzard Strikes Again: APT29’s Comedic Take on Cyber Espionage!
APT29, aka Midnight Blizzard, is using PyRDP for MiTM attacks, with 193 RDP proxy servers to steal data and install malicious payloads. Their targets? Governments, military, and IT sectors in the US, France, and more. Remember, always question that RDP email invite—it could be a trap with a side of malware!

Hot Take:
Ah, APT29, the cyber equivalent of a midnight snack gone wrong! This group is like the Houdini of hacking, using remote desktop protocol (RDP) like a magician uses a top hat. With 193 proxy servers, they’re pulling off a MiTM act that could rival any circus performance. Who knew espionage could be so… remote?
Key Points:
- APT29, aka “Midnight Blizzard,” is using 193 RDP proxy servers for MiTM attacks.
- The attacks target government, military, diplomatic, IT, and telecom sectors.
- PyRDP, a Python tool, is used to intercept and manipulate RDP sessions.
- Victims are tricked through phishing emails leading to rogue RDP servers.
- Evasion tactics include using VPNs, TOR exit nodes, and residential proxies.
Already a member? Log in here