Microsoft Threat Intelligence – Invoke a RDP Client Infection the received emails contained a Remote Desktop Protocol (RDP) configuration file signed with a LetsEncrypt certificate. RDP configuration (.RDP) files summarize automatic settings and resource mappings that are established when a successful connection to an RDP server occurs these configurations extend features and resources of the local system to a remote server controlled by the actor
