The FBI & DHS issued a joint statement alerting businesses and consumers that cybercriminals are increasingly exploiting the Remote Desktop Protocol (RDP) administration tool.

The notice states that using RDP as an attack vector has been on the rise since 2016, with attackers using open RDP ports to hijack machines or intercepting RDP sessions and infecting the system being remotely accessed with different types of malware. There have also been several cases of systems with RDP software present that attackers have exploited by using brute-force techniques to gain access to usernames and passwords.

Attacks on RDP do not require user input and the intrusion itself is difficult to detect. By abusing RDP sessions, hackers can compromise identities, login credential, and demand ransom for other sensitive types of information.

Cybercriminals continue to develop new attack methods for exploiting vulnerable RDP sessions over the web and both business and consumers must take the necessary steps to reduce the likelihood of compromise. Hackers often target weak passwords, specific those with dictionary words or those that do not contain a combination of uppercase/lowercase/numbers/special characters, and those with outdated versions of RDP. Attackers also abuse unrestricted access to the default RDP port and unlimited login attempts to a user account.

CrySIS, CryptOn and SamSam ransomware have been known to spread through RDP attacks. CrySIS has been used mainly to target U.S. businesses that have computers with open RDP ports, using both brute force and dictionary attacks to gain unauthorized remote access. CrySIS then drops the ransomware onto the device and demands payment in Bitcoin for the decryption key.

CryptOn uses brute force attacks to gain access to RDP sessions, allowing the hacker to manually execute malicious programs on the compromised system. SamSam ransomware uses various exploits, including ones attacking RDP-enabled machines in order to perform brute force attacks.

Since RDP has the ability to remotely control a system entirely, organizations must closely regulate, monitor and control its usage. The FBI and DHS recommend taking the following steps to protect against RDP based attacks:

  • Audit your network for systems using RDP; disable the service is not necessary and install available patches
  • Verify that all cloud-based virtual instances with a public IP do not have open RDP ports, namely port 3389, unless there’s a specific business reason to do so. Place any system with an open RDP port behind a firewall and require users to use a VPN to access it through the firewall
  • Enable strong passwords and account lockout policies to defend against brute force attacks
  • Apply two-factor authentication, where possible
  • Apply system and software updates regularly
  • Enable logging and ensure logging mechanism capture RDP logins; keep logs for a minimum of 90 days to review and detect intrusion attempts
  • Minimize network exposure for all control system devices; where possible, critical devices should not have RDP enabled.
  • Regulate and limit external to internal RDP connections. When external access to internal resources is required, use secure methods, such as VPNs
The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.