Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

Credit to Author: Microsoft Threat Intelligence| Date: Tue, 29 Oct 2024 19:00:00 +0000

Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available. Based on our investigation of previous Midnight […]

The post Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files appeared first on Microsoft Security Blog.

Read more

Midnight Blizzard: Guidance for responders on nation-state attack

Credit to Author: Microsoft Threat Intelligence| Date: Fri, 26 Jan 2024 00:00:00 +0000

The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The Microsoft Threat Intelligence investigation identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as NOBELIUM.

The post Midnight Blizzard: Guidance for responders on nation-state attack appeared first on Microsoft Security Blog.

Read more

Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 02 Aug 2023 19:00:00 +0000

Microsoft Threat Intelligence has identified highly targeted social engineering attacks using credential theft phishing lures sent as Microsoft Teams chats by the threat actor that Microsoft tracks as Midnight Blizzard (previously tracked as NOBELIUM).

The post Midnight Blizzard conducts targeted social engineering over Microsoft Teams appeared first on Microsoft Security Blog.

Read more