Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
...credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers’ trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known...-phishing attempts, which are common attack techniques and do not represent any new compromise of Microsoft. The spear-phishing emails in this campaign were sent to thousands of targets in over 100 organizations and contained a signed Remote Desktop Protocol (RDP) configuration file that connected... attack surface reduction rules to help prevent common attack techniques used by threat actors.Block executable content from email client and webmail...