Remote Desktop Exploitation: A Deep Dive into Midnight Blizzard’s RDP Phishing Tactics

In late 2024, Russian state-sponsored threat actor APT29 (Midnight Blizzard) launched a sophisticated spear-phishing campaign leveraging weaponized .rdp files to gain covert access to critical infrastructure across the globe. This talk dissects the operation through the lens of CERT-UA#116903, demonstrating how adversaries abused Remote Desktop Protocol (RDP) in an unexpected, reverse-access fashion. We’ll explore how APT29 leveraged signed .rdp files and social engineering to lure victims across governments, NGOs, and academia. From infrastructure preparation and phishing lures to stealthy execution and persistent access, the session walks through every stage of the kill chain.

    Speaker

    FURTHER SESSIONS

  • AI security lessons from the frontline

  • Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels

  • Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

  • Closing remarks

  • Join us in Amsterdam!

    November 20, 2025

    Hang out, learn something awesome and make new friends.