The Google Threat Intelligence Group (GTIG) has unearthed a novel phishing campaign leveraging Windows Remote Desktop Protocol (.RDP) files to facilitate unauthorized remote access. Dubbed “Rogue RDP,” this campaign specifically targeted European government and military organizations in late 2024. The operation is attributed to a suspected Russia-nexus espionage group, UNC5837, indicating an advanced level of […]
The post Hackers Abuse Windows .RDP Files to Launch Unauthorized Remote Desktop Sessions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform