Remote Desktop Attacks Increasing

The Remote Desktop Protocol (RDP) is being used by cyberattackers to penetrate and extract data from a network before introducing their malicious software to perform internal reconnaissance, according to a new Vectra 2019 Spotlight Report on RDP.


RDP is used by IT system administrators to centrally control their remote systems with the same functionality as if they were local, and RDP is used managed service providers in their management of hundreds of client networks and systems, notes the report. Three major attack scenarios in 2019  – an Iranian cyberespionage group; a Chinese state-sponsored actor; and a healthcare ransomware extortion scheme –  leveraged RDP as part of the broader campaign, says the report.


In September 2018, the FBI warned that the malicious use of RDP “has been on the rise since mid-late 2016," says Vectra. The FBI also reported that several high-profile ransomware attacks, such as Samsam and CrySiS, utilised RDP to laterally move inside of networks. Data from the report shows that 90 percent of the organisations exhibited some form of malicious RDP behaviors between January-June 2019.


Additional findings from the report include:


  • From January-June 2019, 26,800 suspicious RDP behaviors in more than 350 deployments were detected.
  • Manufacturing and finance organizations have the highest rate of RDP detections at 10 and eight detections per 10,000 workloads and devices, respectively.
  • The top five at-risk industries are manufacturing, finance and insurance, retail, government and healthcare. The top three industries – manufacturing, finance and insurance, and retail – together account for almost half (49.8 per cent) of all RDP detections.
  • Within the manufacturing industry, mid-sized organisations had the highest rate of RDP detections at a rate of 20 per 10,000 workloads or devices, which is 82 per cent higher than medium-sized retail and 100 percent higher than small finance and insurance organisations.



more news

Secure Working From Home During Coronavirus


In the wake of the coronavirus, many organisations internationally are allowing people to work from home to lessen the risk of contagion, but is this wise from a cybersecurity point of view? While companies generally have a cybersecurity policy in place that governs the use of anti-virus and firewall protection, individuals without any tech knowledge could fall foul of cybercriminals.

read more

Crypto Miners, Targeted Ransomware Dominate the Threat Landscape


Twenty-eight per cent of all organisations worldwide were impacted by malicious multi-purpose botnets and targeted ransomware attacks rose by 20% according to Check Point Research, the Threat Intelligence and Research arm of Check Point Software.

read more

Kaspersky's Top 7 Mobile Security Threats in 2020


Mobile device security threats are on the rise. In 2014, Kaspersky detected almost 3.5 million pieces of malware on more than 1 million user devices.

read more

SEC Releases Guide To Combat Cybersecurity Threats


The Securities and Exchange Commission has released a guide to best practices to combat cybersecurity infractions, data loss and privacy breaches.

read more