{"id":2945,"date":"2024-12-18T13:01:03","date_gmt":"2024-12-18T13:01:03","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/18\/apt29-hackers-target-high-value-victims-using-rogue-rdp-servers-and-pyrdp\/"},"modified":"2024-12-18T13:01:03","modified_gmt":"2024-12-18T13:01:03","slug":"apt29-hackers-target-high-value-victims-using-rogue-rdp-servers-and-pyrdp","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/18\/apt29-hackers-target-high-value-victims-using-rogue-rdp-servers-and-pyrdp\/","title":{"rendered":"APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP"},"content":{"rendered":"<p>\u200bThe Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.<br \/>\nThe activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a &#8220;rogue RDP&#8221; technique that was previously\u00a0The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.<br \/>\nThe activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a &#8220;rogue RDP&#8221; technique that was previously\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files. The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a &#8220;rogue RDP&#8221; technique that was previously\u00a0The Russia-linked APT29&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/18\/apt29-hackers-target-high-value-victims-using-rogue-rdp-servers-and-pyrdp\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2946,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2945"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2945"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2945\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2946"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}