HomesecurityIncrease in RDP Brute-force attacks due to teleworking

Increase in RDP Brute-force attacks due to teleworking

RDP

Η pandemic has affected all areas of our daily lives, especially work. With more and more people working from home, malicious agents have increased them attacks their attempts to deceive employees.

Given the situation, the platforms Teleconferencing has become a very popular target hacker, since they are now used by a large number of people.

RDP Brute-Force attacks

Remote Desktop Protocol (RDP) is one of the most popular protocols developed by Microsoft products, which allows users to connect to workstations or remote servers.

By imposing restrictive measures to protect against it coronavirus, The data businesses are at greater risk, as they are more easily targeted by malicious agents.

"The attackers who carry out Brute-force attacks are not accurate in their approach, but they operate in each area. As far as we can tell, after the mass transition to homework, they have logically concluded that the number of poorly configured RDP servers will increase, hence the increase in the number of such attacks, "Kaspersky said in a statement. blog post.

To perform RDP brute-force attacks, hackers use various tools to detect IP addresses and ports used by RDP servers.

Once they detect the servers, the intruders use various combinations of username and password to gain access to them.

If they manage to gain access to one of them servers, can then sell RDP credentials to Dark web, install malware, disable antivirus programs, steal business data, and more.

How can you reduce the chances of such attacks:

  • Set strong RDP passwords
  • Apply network level authentication
  • Apply two-factor authentication
  • Disable RDP if not in use
  • Implement account locking policy

Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement
spot_img

LIVE NEWS