The advanced persistent threat (APT) group Earth Koshchei, also known as APT29 or Midnight Blizzard, has launched a major cyberespionage campaign. Using a method called “rogue RDP,” the group sent spear-phishing emails containing a malicious Remote Desktop Protocol file which, when opened, tried to connect to rogue servers. Various entities including governments, military organizations, and researchers were targeted, primarily for espionage purposes. Experts say the campaign demonstrates how genuine cybersecurity tools can be used maliciously, highlighting the need for stronger defensive measures.

Warning issued over ‘fast flux’ techniques used to obscure malicious signals on compromised networks
Law enforcement agencies have warned that organizations face a common network vulnerability that allows hackers to dodge detection and distribute malicious software indiscriminately. Referred to