Earth Koshchei, also referred to as APT29, launched a highly advanced Remote Desktop Protocol (RDP) attack campaign, integrating spear-phishing tactics and malicious RDP configuration files to compromise high-value targets. By exploiting over 200 fraudulent domains designed to impersonate legitimate organizations, the group deceived victims into accessing rogue RDP relays, facilitating the deployment of malicious scripts and unauthorized system access.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox