Going Rogue: APT49 Using Rogue RDP | Threat SnapShot

Going Rogue: APT49 Using Rogue RDP | Threat SnapShot

In 2022, Microsoft began blocking macros originating from the internet in Office, pushing both pentesters and threat actors to explore new methods for initial access. Fast forward to October 2024, and APT29 is leveraging one of those methods—Rogue RDP—discovered as a workaround back in 2022. In this video, we dive into a recent spearphishing campaign uncovered by the Ukrainian CERT, where attackers used Rogue RDP to gain initial access to targets. This video will provide you practical detection opportunities that can be used to hunt for this activity in your environment.

✅ *Subscribe to SnapAttack for more in-depth analyses and real-world applications of cybersecurity defenses.*

📢 *Have questions or topics you’d like us to cover? Drop a comment below!*

👋 *Follow us:*
https://www.linkedin.com/company/snapattack/
https://twitter.com/snapattackhq
https://www.linkedin.com/in/ajkingio/
https://twitter.com/ajkingio

SnapAttack Resources:

References: