{"id":136186,"date":"2024-10-29T12:00:00","date_gmt":"2024-10-29T19:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=136186"},"modified":"2024-11-08T07:06:14","modified_gmt":"2024-11-08T15:06:14","slug":"midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/10\/29\/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files\/","title":{"rendered":"Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files"},"content":{"rendered":"\n
Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will continue to investigate and provide updates as available. Based on our investigation of previous Midnight Blizzard spear-phishing campaigns, we assess that the goal of this operation is likely intelligence collection. Microsoft is releasing this blog to notify the public and disrupt this threat actor activity. This blog provides context on these external spear-phishing attempts, which are common attack techniques and do not represent any new compromise of Microsoft.<\/p>\n\n\n\n
The spear-phishing emails in this campaign were sent to thousands of targets in over 100 organizations and contained a signed Remote Desktop Protocol (RDP) configuration file that connected to an actor-controlled server. In some of the lures, the actor attempted to add credibility to their malicious messages by impersonating Microsoft employees. The threat actor also referenced other cloud providers in the phishing lures. <\/p>\n\n\n\n
While this campaign focuses on many of Midnight Blizzard\u2019s usual targets, the use of a signed RDP configuration file to gain access to the targets\u2019 devices represents a novel access vector for this actor. Overlapping activity has <\/a>also been reported by the Government Computer Emergency Response Team of Ukraine (CERT-UA) under the designation UAC-0215<\/a> and also by Amazon<\/a>.<\/p>\n\n\n\n Midnight Blizzard<\/a> is a Russian threat actor attributed by the United States<\/a> and United Kingdom governments to the Foreign Intelligence Service of the Russian Federation, also known as the SVR. This threat actor is known to primarily target governments, diplomatic entities, non-governmental organizations (NGOs), and IT service providers, primarily in the United States and Europe. Its focus is to collect intelligence through longstanding and dedicated espionage of foreign interests that can be traced to early 2018. Its operations often involve compromise of valid accounts and, in some highly targeted cases, advanced techniques to compromise authentication mechanisms within an organization to expand access and evade detection.<\/p>\n\n\n\n Midnight Blizzard is consistent and persistent in its operational targeting, and its objectives rarely change. It uses diverse initial access methods, including spear phishing, stolen credentials, supply chain attacks, compromise of on-premises environments to laterally move to the cloud, and leveraging service providers\u2019 trust chain to gain access to downstream customers. Midnight Blizzard is known to use the Active Directory Federation Service (AD FS) malware known as FOGGYWEB<\/a> and MAGICWEB<\/a>. Midnight Blizzard is identified by peer security vendors as APT29, UNC2452, and Cozy Bear.<\/p>\n\n\n\n As with any observed nation-state actor activity, Microsoft is in the process of directly notifying customers that have been targeted or compromised, providing them with the necessary information to secure their accounts. Strong anti-phishing measures will help to mitigate this threat. As part of our commitment to helping protect against cyber threats, we provide indicators of compromise (IOCs), hunting queries, detection details, and recommendations at the end of this post.<\/p>\n\n\n\n On October 22, 2024, Microsoft identified a spear-phishing campaign in which Midnight Blizzard sent phishing emails to thousands of users in over 100 organizations. The emails were highly targeted, using social engineering lures relating to Microsoft, Amazon Web Services (AWS), and the concept of Zero Trust. The emails contained a Remote Desktop Protocol (RDP) configuration file signed with a LetsEncrypt certificate. RDP configuration (.RDP) files summarize automatic settings and resource mappings that are established when a successful connection to an RDP server occurs. These configurations extend features and resources of the local system to a remote server, controlled by the actor.<\/p>\n\n\n\n In this campaign, the malicious .RDP attachment contained several sensitive settings that would lead to significant information exposure. Once the target system was compromised, it connected to the actor-controlled server and bidirectionally mapped the targeted user\u2019s local device\u2019s resources to the server. Resources sent to the server may include, but are not limited to, all logical hard disks, clipboard contents, printers, connected peripheral devices, audio, and authentication features and facilities of the Windows operating system, including smart cards. This access could enable the threat actor to install malware on the target\u2019s local drive(s) and mapped network share(s), particularly in AutoStart folders, or install additional tools such as remote access trojans (RATs) to maintain access when the RDP session is closed. The process of establishing an RDP connection to the actor-controlled system may also expose the credentials of the user signed in to the target system.<\/p>\n\n\n When the target user opened the .RDP attachment, an RDP connection was established to an actor-controlled system. The configuration of the RDP connection then allowed the actor-controlled system to discover and use information about the target system, including:<\/p>\n\n\n\n Microsoft has observed this campaign targeting governmental agencies, higher education, defense, and non-governmental organizations in dozens of countries, but particularly in the United Kingdom, Europe, Australia, and Japan. This target set is consistent with other Midnight Blizzard phishing campaigns.<\/p>\n\n\n\n Midnight Blizzard sent the phishing emails in this campaign using email addresses belonging to legitimate organizations that were gathered during previous compromises. The domains used are listed in the IOC section below.<\/p>\n\n\n\n Microsoft recommends the following mitigations to reduce the impact of this threat.<\/p>\n\n\n\n If you are using Microsoft Defender for Endpoint take the following steps:<\/p>\n\n\n\n The following alerts may also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.<\/p>\n\n\n\n Microsoft Defender Antivirus detects at least some of the malicious .RDP files as the following signature:<\/p>\n\n\n\n The following alerts may also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.<\/p>\n\n\n\n Microsoft Defender for Office 365 raises alerts on this campaign using email- and attachment-based detections. Additionally, hunting signatures and an RDP file parser have been incorporated into detections to block similar campaigns in the future. Defenders can identify such activity in alert titles referencing RDP, for example, Trojan_RDP*<\/em>.<\/p>\n\n\n\n Microsoft customers can use the following reports in Microsoft products to get the most up-to-date information about the threat actor, malicious activity, and techniques discussed in this blog. These reports provide threat intelligence, protection information, and recommended actions to prevent, mitigate, or respond to associated threats found in customer environments.<\/p>\n\n\n\n Microsoft Defender Threat Intelligence<\/strong><\/p>\n\n\n\n Identify potential Midnight Blizzard targeted recipients<\/strong> <\/p>\n\n\n\n Surface possible targeted email accounts within the environment where the email sender originated from a Midnight Blizzard compromised domain related to the RDP activity. <\/p>\n\n\n Surface potential targets of an RDP attachment phishing attempt<\/strong><\/p>\n\n\n\n Surface emails that contain a remote desktop protocol (RDP) file attached. This may indicate that the recipient of the email may have been targeted in an RDP attachment phishing attack attempt. <\/p>\n\n\n Identify potential successfully targeted assets in an RDP attachment phishing attack<\/strong><\/p>\n\n\n\n Surface devices that may have been targeted in an email with an RDP file attached, followed by an RDP connection attempt from the device to an external network. This combined activity may indicate that a device may have been successfully targeted in an RDP attachment phishing attack. <\/p>\n\n\n Threat actor RDP connection files attached to email<\/strong><\/p>\n\n\n\n Surface users that may have received an RDP connection file attached in email that have been observed in this attack from Midnight Blizzard.<\/p>\n\n\n Microsoft Sentinel customers can use the TI Mapping analytics (a series of analytics all prefixed with \u2018TI map\u2019) to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub<\/a> to have the analytics rule deployed in their Sentinel workspace.<\/p>\n\n\n\n For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n\n\n\n To get notified about new publications and to join discussions on social media, follow us on LinkedIn at https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence<\/a>, and on X (formerly Twitter) at https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n\n\n\nSpear-phishing campaign<\/h2>\n\n\n\n
RDP connection<\/h3>\n\n\n\n
\n
Targets<\/h3>\n\n\n\n
Email infrastructure<\/h3>\n\n\n\n
Mitigations<\/h2>\n\n\n\n
Strengthen operating environment configuration<\/h3>\n\n\n\n
\n
Strengthen endpoint security configuration<\/h3>\n\n\n\n
\n
\n
Strengthen antivirus configuration<\/h3>\n\n\n\n
\n
Strengthen Microsoft Office 365 configuration<\/h3>\n\n\n\n
\n
Strengthen email security configuration<\/h3>\n\n\n\n
\n
Conduct user education<\/h3>\n\n\n\n
\n
Microsoft Defender XDR detections<\/h2>\n\n\n\n
Microsoft Defender for Endpoint<\/h3>\n\n\n\n
\n
Microsoft Defender Antivirus<\/h3>\n\n\n\n
\n
Microsoft Defender for Cloud<\/h3>\n\n\n\n
\n
Microsoft Defender for Office 365<\/h3>\n\n\n\n
Threat intelligence reports<\/h2>\n\n\n\n
\n
Hunting queries<\/h2>\n\n\n\n
Microsoft Defender XDR<\/h3>\n\n\n\n
\nEmailEvents \n| where SenderFromDomain in~ ("sellar.co.uk", "townoflakelure.com", "totalconstruction.com.au", "swpartners.com.au", "cewalton.com") \n| project SenderFromDomain, SenderFromAddress, RecipientEmailAddress, Subject, Timestamp \n<\/pre><\/div>\n\n\n
\nEmailAttachmentInfo\n| where FileName has ".rdp"\n| join kind=inner (EmailEvents) on NetworkMessageId\n| project SenderFromAddress, RecipientEmailAddress, Subject, Timestamp, FileName, FileType\n<\/pre><\/div>\n\n\n
\n\/\/ Step 1: Identify emails with RDP attachments\nlet rdpEmails = EmailAttachmentInfo\n| where FileName has ".rdp"\n| join kind=inner (EmailEvents) on NetworkMessageId\n| project EmailTimestamp = Timestamp, RecipientEmailAddress, NetworkMessageId, SenderFromAddress;\n\/\/ Step 2: Identify outbound RDP connections\nlet outboundRDPConnections = DeviceNetworkEvents\n| where RemotePort == 3389\n| where ActionType == "ConnectionAttempt"\n| where RemoteIPType == "Public"\n| project RDPConnectionTimestamp = Timestamp, DeviceId, InitiatingProcessAccountUpn, RemoteIP;\n\/\/ Step 3: Correlate email and network events\nrdpEmails\n| join kind=inner (outboundRDPConnections) on $left.RecipientEmailAddress == $right.InitiatingProcessAccountUpn\n| project EmailTimestamp, RecipientEmailAddress, SenderFromAddress, RDPConnectionTimestamp, DeviceId, RemoteIP\n<\/pre><\/div>\n\n\n
\nEmailAttachmentInfo\n| where FileName in~ (\n "AWS IAM Compliance Check.rdp",\n "AWS IAM Configuration.rdp",\n "AWS IAM Quick Start.rdp",\n "AWS SDE Compliance Check.rdp",\n "AWS SDE Environment Check.rdp",\n "AWS Secure Data Exchange - Compliance Check.rdp",\n "AWS Secure Data Exchange Compliance.rdp",\n "Device Configuration Verification.rdp",\n "Device Security Requirements Check.rdp",\n "IAM Identity Center Access.rdp",\n "IAM Identity Center Application Access.rdp",\n "Zero Trust Architecture Configuration.rdp",\n "Zero Trust Security Environment Compliance Check.rdp",\n "ZTS Device Compatibility Test.rdp"\n)\n| project Timestamp, FileName, SHA256, RecipientEmailAddress, SenderDisplayName, SenderFromAddress\n<\/pre><\/div>\n\n\n
Microsoft Sentinel<\/h3>\n\n\n\n
Indicators of compromise<\/h2>\n\n\n\n
Email sender domains <\/h4>\n\n\n\n
\n
Domains<\/strong><\/td> Last seen<\/strong><\/td><\/tr> sellar[.]co.uk<\/td> October 23, 2024<\/td><\/tr> townoflakelure[.]com<\/td> October 23, 2024<\/td><\/tr> totalconstruction[.]com.au<\/td> October 23, 2024<\/td><\/tr> swpartners[.]com.au<\/td> October 23, 2024<\/td><\/tr> cewalton[.]com<\/td> October 23, 2024<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n RDP file names<\/h4>\n\n\n\n
\n
RDP remote computer domains<\/h4>\n\n\n\n
ap-northeast-1-aws.s3-ua[.]cloud<\/td> ap-northeast-1-aws.ukrainesec[.]cloud<\/td><\/tr> ca-central-1.gov-ua[.]cloud<\/td> ca-central-1.ua-gov[.]cloud<\/td><\/tr> ca-west-1.aws-ukraine[.]cloud<\/td> ca-west-1.mfa-gov[.]cloud<\/td><\/tr> ca-west-1.ukrtelecom[.]cloud<\/td> central-2-aws.ua-mil[.]cloud<\/td><\/tr> central-2-aws.ua-sec[.]cloud<\/td> central-2-aws.ukrainesec[.]cloud<\/td><\/tr> central-2-aws.ukrtelecom[.]cloud<\/td> eu-central-1.difesa-it[.]cloud<\/td><\/tr> eu-central-1.mfa-gov[.]cloud<\/td> eu-central-1.mil-be[.]cloud<\/td><\/tr> eu-central-1.mil-pl[.]cloud<\/td> eu-central-1.minbuza[.]cloud<\/td><\/tr> eu-central-1.mindef-nl[.]cloud<\/td> eu-central-1.msz-pl[.]cloud<\/td><\/tr> eu-central-1.quirinale[.]cloud<\/td> eu-central-1.regeringskansliet-se[.]cloud<\/td><\/tr> eu-central-1.s3-be[.]cloud<\/td> eu-central-1.s3-esa[.]cloud<\/td><\/tr> eu-central-1.s3-nato[.]cloud<\/td> eu-central-1.ua-gov[.]cloud<\/td><\/tr> eu-central-1.ua-sec[.]cloud<\/td> eu-central-1.ukrtelecom[.]cloud<\/td><\/tr> eu-central-1-aws.amazonsolutions[.]cloud<\/td> eu-central-1-aws.dep-no[.]cloud<\/td><\/tr> eu-central-1-aws.gov-pl[.]cloud<\/td> eu-central-1-aws.gov-sk[.]cloud<\/td><\/tr> eu-central-1-aws.gov-trust[.]cloud<\/td> eu-central-1-aws.mfa-gov[.]cloud<\/td><\/tr> eu-central-1-aws.minbuza[.]cloud<\/td> eu-central-1-aws.mindef-nl[.]cloud<\/td><\/tr> eu-central-1-aws.msz-pl[.]cloud<\/td> eu-central-1-aws.mzv-sk[.]cloud<\/td><\/tr> eu-central-1-aws.ncfta[.]cloud<\/td> eu-central-1-aws.presidencia-pt[.]cloud<\/td><\/tr> eu-central-1-aws.quirinale[.]cloud<\/td> eu-central-1-aws.regeringskansliet-se[.]cloud<\/td><\/tr> eu-central-1-aws.s3-be[.]cloud<\/td> eu-central-1-aws.s3-ua[.]cloud<\/td><\/tr> eu-central-1-aws.ua-gov[.]cloud<\/td> eu-central-1-aws.ukrainesec[.]cloud<\/td><\/tr> eu-central-2-aws.amazonsolutions[.]cloud<\/td> eu-central-2-aws.aws-ukraine[.]cloud<\/td><\/tr> eu-central-2-aws.dep-no[.]cloud<\/td> eu-central-2-aws.gov-pl[.]cloud<\/td><\/tr> eu-central-2-aws.gov-sk[.]cloud<\/td> eu-central-2-aws.mil-be[.]cloud<\/td><\/tr> eu-central-2-aws.mil-pl[.]cloud<\/td> eu-central-2-aws.mindef-nl[.]cloud<\/td><\/tr> eu-central-2-aws.msz-pl[.]cloud<\/td> eu-central-2-aws.mzv-sk[.]cloud<\/td><\/tr> eu-central-2-aws.presidencia-pt[.]cloud<\/td> eu-central-2-aws.regeringskansliet-se[.]cloud<\/td><\/tr> eu-central-2-aws.s3-be[.]cloud<\/td> eu-central-2-aws.ua-gov[.]cloud<\/td><\/tr> eu-central-2-aws.ua-mil[.]cloud<\/td> eu-central-2-aws.ukrtelecom[.]cloud<\/td><\/tr> eu-east-1-aws.amazonsolutions[.]cloud<\/td> eu-east-1-aws.dep-no[.]cloud<\/td><\/tr> eu-east-1-aws.gov-sk[.]cloud<\/td> eu-east-1-aws.gov-ua[.]cloud<\/td><\/tr> eu-east-1-aws.mil-be[.]cloud<\/td> eu-east-1-aws.mil-pl[.]cloud<\/td><\/tr> eu-east-1-aws.minbuza[.]cloud<\/td> eu-east-1-aws.mindef-nl[.]cloud<\/td><\/tr> eu-east-1-aws.msz-pl[.]cloud<\/td> eu-east-1-aws.mzv-sk[.]cloud<\/td><\/tr> eu-east-1-aws.quirinale[.]cloud<\/td> eu-east-1-aws.regeringskansliet-se[.]cloud<\/td><\/tr> eu-east-1-aws.s3-be[.]cloud<\/td> eu-east-1-aws.s3-de[.]cloud<\/td><\/tr> eu-east-1-aws.ua-gov[.]cloud<\/td> eu-east-1-aws.ua-sec[.]cloud<\/td><\/tr> eu-east-1-aws.ukrtelecom[.]cloud<\/td> eu-north-1.difesa-it[.]cloud<\/td><\/tr> eu-north-1.gov-trust[.]cloud<\/td> eu-north-1.gov-ua[.]cloud<\/td><\/tr> eu-north-1.gv-at[.]cloud<\/td> eu-north-1.mil-be[.]cloud<\/td><\/tr> eu-north-1.mil-pl[.]cloud<\/td> eu-north-1.mzv-sk[.]cloud<\/td><\/tr> eu-north-1.ncfta[.]cloud<\/td> eu-north-1.regeringskansliet-se[.]cloud<\/td><\/tr> eu-north-1.s3-be[.]cloud<\/td> eu-north-1.s3-de[.]cloud<\/td><\/tr> eu-north-1.s3-ua[.]cloud<\/td> eu-north-1-aws.dep-no[.]cloud<\/td><\/tr> eu-north-1-aws.difesa-it[.]cloud<\/td> eu-north-1-aws.gov-pl[.]cloud<\/td><\/tr> eu-north-1-aws.gov-sk[.]cloud<\/td> eu-north-1-aws.mil-be[.]cloud<\/td><\/tr> eu-north-1-aws.mil-pl[.]cloud<\/td> eu-north-1-aws.minbuza[.]cloud<\/td><\/tr> eu-north-1-aws.ncfta[.]cloud<\/td> eu-north-1-aws.presidencia-pt[.]cloud<\/td><\/tr> eu-north-1-aws.quirinale[.]cloud<\/td> eu-north-1-aws.regeringskansliet-se[.]cloud<\/td><\/tr> eu-north-1-aws.s3-be[.]cloud<\/td> eu-north-1-aws.s3-de[.]cloud<\/td><\/tr> eu-north-1-aws.ua-energy[.]cloud<\/td> eu-north-1-aws.ua-gov[.]cloud<\/td><\/tr> eu-south-1-aws.admin-ch[.]cloud<\/td> eu-south-1-aws.dep-no[.]cloud<\/td><\/tr> eu-south-1-aws.difesa-it[.]cloud<\/td> eu-south-1-aws.gov-pl[.]cloud<\/td><\/tr> eu-south-1-aws.gov-trust[.]cloud<\/td> eu-south-1-aws.mfa-gov[.]cloud<\/td><\/tr> eu-south-1-aws.mil-be[.]cloud<\/td> eu-south-1-aws.minbuza[.]cloud<\/td><\/tr> eu-south-1-aws.mzv-sk[.]cloud<\/td> eu-south-1-aws.quirinale[.]cloud<\/td><\/tr> eu-south-1-aws.s3-be[.]cloud<\/td> eu-south-1-aws.s3-de[.]cloud<\/td><\/tr> eu-south-1-aws.ua-gov[.]cloud<\/td> eu-south-2.dep-no[.]cloud<\/td><\/tr> eu-south-2.gov-pl[.]cloud<\/td> eu-south-2.gov-sk[.]cloud<\/td><\/tr> eu-south-2.mil-be[.]cloud<\/td> eu-south-2.mil-pl[.]cloud<\/td><\/tr> eu-south-2.mindef-nl[.]cloud<\/td> eu-south-2.s3-be[.]cloud<\/td><\/tr> eu-south-2.s3-de[.]cloud<\/td> eu-south-2.s3-esa[.]cloud<\/td><\/tr> eu-south-2.s3-nato[.]cloud<\/td> eu-south-2.ua-sec[.]cloud<\/td><\/tr> eu-south-2.ukrainesec[.]cloud<\/td> eu-south-2-aws.amazonsolutions[.]cloud<\/td><\/tr> eu-south-2-aws.dep-no[.]cloud<\/td> eu-south-2-aws.gov-pl[.]cloud<\/td><\/tr> eu-south-2-aws.gov-sk[.]cloud<\/td> eu-south-2-aws.mfa-gov[.]cloud<\/td><\/tr> eu-south-2-aws.mil-be[.]cloud<\/td> eu-south-2-aws.mil-pl[.]cloud<\/td><\/tr> eu-south-2-aws.mil-pt[.]cloud<\/td> eu-south-2-aws.minbuza[.]cloud<\/td><\/tr> eu-south-2-aws.msz-pl[.]cloud<\/td> eu-south-2-aws.mzv-sk[.]cloud<\/td><\/tr> eu-south-2-aws.ncfta[.]cloud<\/td> eu-south-2-aws.quirinale[.]cloud<\/td><\/tr> eu-south-2-aws.regeringskansliet-se[.]cloud<\/td> eu-south-2-aws.s3-be[.]cloud<\/td><\/tr> eu-south-2-aws.s3-de[.]cloud<\/td> eu-south-2-aws.s3-esa[.]cloud<\/td><\/tr> eu-south-2-aws.s3-nato[.]cloud<\/td> eu-south-2-aws.s3-ua[.]cloud<\/td><\/tr> eu-south-2-aws.ua-gov[.]cloud<\/td> eu-southeast-1-aws.amazonsolutions[.]cloud<\/td><\/tr> eu-southeast-1-aws.aws-ukraine[.]cloud<\/td> eu-southeast-1-aws.dep-no[.]cloud<\/td><\/tr> eu-southeast-1-aws.difesa-it[.]cloud<\/td> eu-southeast-1-aws.gov-sk[.]cloud<\/td><\/tr> eu-southeast-1-aws.gov-trust[.]cloud<\/td> eu-southeast-1-aws.mil-be[.]cloud<\/td><\/tr> eu-southeast-1-aws.mil-pl[.]cloud<\/td> eu-southeast-1-aws.mindef-nl[.]cloud<\/td><\/tr> eu-southeast-1-aws.msz-pl[.]cloud<\/td> eu-southeast-1-aws.mzv-cz[.]cloud<\/td><\/tr> eu-southeast-1-aws.mzv-sk[.]cloud<\/td> eu-southeast-1-aws.quirinale[.]cloud<\/td><\/tr> eu-southeast-1-aws.s3-be[.]cloud<\/td> eu-southeast-1-aws.s3-de[.]cloud<\/td><\/tr> eu-southeast-1-aws.s3-esa[.]cloud<\/td> eu-southeast-1-aws.s3-ua[.]cloud<\/td><\/tr> eu-southeast-1-aws.ua-energy[.]cloud<\/td> eu-southeast-1-aws.ukrainesec[.]cloud<\/td><\/tr> eu-west-1.aws-ukraine[.]cloud<\/td> eu-west-1.difesa-it[.]cloud<\/td><\/tr> eu-west-1.gov-sk[.]cloud<\/td> eu-west-1.mil-be[.]cloud<\/td><\/tr> eu-west-1.mil-pl[.]cloud<\/td> eu-west-1.minbuza[.]cloud<\/td><\/tr> eu-west-1.msz-pl[.]cloud<\/td> eu-west-1.mzv-sk[.]cloud<\/td><\/tr> eu-west-1.regeringskansliet-se[.]cloud<\/td> eu-west-1.s3-de[.]cloud<\/td><\/tr> eu-west-1.s3-esa[.]cloud<\/td> eu-west-1.s3-ua[.]cloud<\/td><\/tr> eu-west-1.ua-gov[.]cloud<\/td> eu-west-1.ukrtelecom[.]cloud<\/td><\/tr> eu-west-1-aws.amazonsolutions[.]cloud<\/td> eu-west-1-aws.aws-ukraine[.]cloud<\/td><\/tr> eu-west-1-aws.dep-no[.]cloud<\/td> eu-west-1-aws.gov-pl[.]cloud<\/td><\/tr> eu-west-1-aws.gov-sk[.]cloud<\/td> eu-west-1-aws.gov-trust[.]cloud<\/td><\/tr> eu-west-1-aws.gov-ua[.]cloud<\/td> eu-west-1-aws.mil-be[.]cloud<\/td><\/tr> eu-west-1-aws.mil-pl[.]cloud<\/td> eu-west-1-aws.minbuza[.]cloud<\/td><\/tr> eu-west-1-aws.quirinale[.]cloud<\/td> eu-west-1-aws.s3-be[.]cloud<\/td><\/tr> eu-west-1-aws.s3-de[.]cloud<\/td> eu-west-1-aws.s3-esa[.]cloud<\/td><\/tr> eu-west-1-aws.s3-nato[.]cloud<\/td> eu-west-1-aws.ua-sec[.]cloud<\/td><\/tr> eu-west-1-aws.ukrainesec[.]cloud<\/td> eu-west-2-aws.amazonsolutions[.]cloud<\/td><\/tr> eu-west-2-aws.dep-no[.]cloud<\/td> eu-west-2-aws.difesa-it[.]cloud<\/td><\/tr> eu-west-2-aws.gov-pl[.]cloud<\/td> eu-west-2-aws.gov-sk[.]cloud<\/td><\/tr> eu-west-2-aws.gv-at[.]cloud<\/td> eu-west-2-aws.mil-be[.]cloud<\/td><\/tr> eu-west-2-aws.mil-pl[.]cloud<\/td> eu-west-2-aws.minbuza[.]cloud<\/td><\/tr> eu-west-2-aws.mindef-nl[.]cloud<\/td> eu-west-2-aws.msz-pl[.]cloud<\/td><\/tr> eu-west-2-aws.mzv-sk[.]cloud<\/td> eu-west-2-aws.quirinale[.]cloud<\/td><\/tr> eu-west-2-aws.s3-be[.]cloud<\/td> eu-west-2-aws.s3-de[.]cloud<\/td><\/tr> eu-west-2-aws.s3-esa[.]cloud<\/td> eu-west-2-aws.s3-nato[.]cloud<\/td><\/tr> eu-west-2-aws.s3-ua[.]cloud<\/td> eu-west-2-aws.ua-sec[.]cloud<\/td><\/tr> eu-west-3.amazonsolutions[.]cloud<\/td> eu-west-3.aws-ukraine[.]cloud<\/td><\/tr> eu-west-3.mil-be[.]cloud<\/td> eu-west-3.mil-pl[.]cloud<\/td><\/tr> eu-west-3.minbuza[.]cloud<\/td> eu-west-3.mindef-nl[.]cloud<\/td><\/tr> eu-west-3.msz-pl[.]cloud<\/td> eu-west-3.mzv-sk[.]cloud<\/td><\/tr> eu-west-3.presidencia-pt[.]cloud<\/td> eu-west-3.s3-be[.]cloud<\/td><\/tr> eu-west-3.s3-ua[.]cloud<\/td> eu-west-3.ukrainesec[.]cloud<\/td><\/tr> eu-west-3.ukrtelecom[.]cloud<\/td> eu-west-3-aws.aws-ukraine[.]cloud<\/td><\/tr> eu-west-3-aws.dep-no[.]cloud<\/td> eu-west-3-aws.difesa-it[.]cloud<\/td><\/tr> eu-west-3-aws.gov-pl[.]cloud<\/td> eu-west-3-aws.gov-sk[.]cloud<\/td><\/tr> eu-west-3-aws.gov-trust[.]cloud<\/td> eu-west-3-aws.mil-be[.]cloud<\/td><\/tr> eu-west-3-aws.mil-pl[.]cloud<\/td> eu-west-3-aws.mil-pt[.]cloud<\/td><\/tr> eu-west-3-aws.minbuza[.]cloud<\/td> eu-west-3-aws.mindef-nl[.]cloud<\/td><\/tr> eu-west-3-aws.msz-pl[.]cloud<\/td> eu-west-3-aws.mzv-sk[.]cloud<\/td><\/tr> eu-west-3-aws.quirinale[.]cloud<\/td> eu-west-3-aws.regeringskansliet-se[.]cloud<\/td><\/tr> eu-west-3-aws.s3-be[.]cloud<\/td> eu-west-3-aws.s3-ua[.]cloud<\/td><\/tr> eu-west-3-aws.ua-mil[.]cloud<\/td> us-east-1-aws.mfa-gov[.]cloud<\/td><\/tr> us-east-1-aws.s3-ua[.]cloud<\/td> us-east-1-aws.ua-gov[.]cloud<\/td><\/tr> us-east-1-aws.ua-sec[.]cloud<\/td> us-east-2.aws-ukraine[.]cloud<\/td><\/tr> us-east-2.gov-ua[.]cloud<\/td> us-east-2.ua-sec[.]cloud<\/td><\/tr> us-east-2.ukrainesec[.]cloud<\/td> us-east-2-aws.gov-ua[.]cloud<\/td><\/tr> us-east-2-aws.ua-gov[.]cloud<\/td> us-east-2-aws.ukrtelecom[.]cloud<\/td><\/tr> us-east-console.aws-ukraine[.]cloud<\/td> us-east-console.ua-energy[.]cloud<\/td><\/tr> us-west-1.aws-ukraine[.]cloud<\/td> us-west-1.ua-energy[.]cloud<\/td><\/tr> us-west-1.ua-gov[.]cloud<\/td> us-west-1.ukrtelecom[.]cloud<\/td><\/tr> us-west-1-amazon.ua-energy[.]cloud<\/td> us-west-1-amazon.ua-mil[.]cloud<\/td><\/tr> us-west-1-amazon.ua-sec[.]cloud<\/td> us-west-1-aws.gov-ua[.]cloud<\/td><\/tr> us-west-2.gov-ua[.]cloud<\/td> us-west-2.ua-energy[.]cloud<\/td><\/tr> us-west-2.ua-sec[.]cloud<\/td> us-west-2-aws.mfa-gov[.]cloud<\/td><\/tr> us-west-2-aws.s3-ua[.]cloud<\/td> us-west-2-aws.ua-energy[.]cloud<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n References<\/h2>\n\n\n\n
\n
Learn more<\/h2>\n\n\n\n