Recently, the cyberattacks are at their peak; RDP Brute-Force attacks have increased by more than 100k, as hackers are constantly attempting it for remote hacks. These attacks have increased mainly in this lockdown period due to the severe COVID-19 pandemic.
In May, Kaspersky warned that the rising of RDP based attacks to launch different types of attacks like phishing, malware, fraud, and disinformation campaigns.
During this COVID-19, the way of doing work has changed, as people are working from home online. As this situation has affected the whole world, so, the employees are forced to work from home and do most of the work remotely.
Since most of the employees around the world are working as remote workers, they are the primary victims who get affected by the cybercriminals, mainly the ransomware operator, who always keeps an eye on their daily work and shift.
The rapid surge in remote workers has given the attacker to exploit the all-new opportunity and improve their illegal earnings. According to the ESET security firm report, these attacks are increasing rapidly, and they informed that hackers attempt more than 100k RDP brute-force attacks for remote hacks.
Cybercriminals had made personal devices as their primary instrument so that they can easily connect to the working environment through remote desktop service or Windows Remote Desktop Protocol.
This is a golden opportunity for cybercriminals, they did not waste any time, and they increased the number of RDP based brute-force attacks.
To gain access to the network, hackers deploy their malware, and these attacks have increased by more than 100,000 in April and May. The company affirmed that hackers are focusing on the RDP services so that the hackers can deploy their malicious tools for decrypting the company data.
To configure the remote access correctly, we have to follow some necessary steps that we have mentioned below:-
Here are the common synopses following an RDP compromise can accommodate:-
Therefore, the firm asserted that they would support the RDP by using strong, unique passwords for all accounts that are accessible through RDP and providing an additional layer of authentication that is the two/multi-factor authentication.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Attackers are exploiting the recently discovered critical security vulnerability tracked as (CVE-2023-46604) affecting Apache ActiveMQ…
Media reports highlight the sale of LLMs like WormGPT and FraudGPT on underground forums. Fears…
An open-source security scanner, developed by Git Hub user Adam Swanda, was released to explore…
One of Slovenia's major power providers, HSE, has recently fallen victim to a significant cyberattack.…
In the labyrinthine landscape of cyber threats, the Trend Micro Managed XDR team has uncovered…
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 - A severe design flaw in…