Without physical interaction, an RDP allows one machine to connect to another or to a network. The Ransomware Deployment Protocol (RDP) is the most common initial ransomware attack vector, and it has been for years. Unit 42 examined data from over 1,000 incidents for the 2020 Unit 42 Incident Response and Data Breach Report and discovered that RDP was the first attack vector in 50% of ransomware deployment cases.RDP is a Microsoft Windows protocol that allows users to connect to and control a remote machine from a remote location. Allowing IT assistance to remotely control a user's machine to repair a problem is the most prevalent legitimate application. RDP has lately gained popularity in cloud computing for accessing virtual machines (VMs) in cloud settings and managing cloud assets remotely.By leaving RDP open on a forgotten system, cloud instance, device formerly secured by network segmentation, or by connecting directly to the internet, it is relatively easy to expose RDP unintentionally. Worse, RDP has become a more pervasive, exposed, and common danger that can lead to assaults – notably ransomware deployment – data loss, costly downtime, and other issues.Types of attack can be as follows: RDP attackers must balance a lot of variables, each with millions of possible possibilities. They must decide which targets to attack and how many they will strike at once. They must choose a password guessing rate that is high enough to be effective while avoiding alarming the user. Then they must choose usernames and passwords from an almost infinite number of options.They must also evaluate how much work they are willing to put into compromising a large number of low-privileged user accounts vs a smaller number of rarer, more highly empowered (and likely more secure) administrator accounts.Some attackers, for example, appear to make only three login attempts on one honeypot before moving on to another. In such a quick assault, reaching the greatest number of targets in the shortest amount of time takes precedence over comprehensive and time-consuming research of username or password lists. This could be an effort to get around certain administrators' three failed login attempts per IP address limit. It's also possible that the IP addresses used in these attacks are part of a botnet that employs numerous computers to launch a coordinated attack.There are more targets when there are more exposures.The COVID-19 epidemic prompted a boom in working from home, which meant laptops were relocated from the secure confines of an office network with a firewall to unprotected home networks. Inventorying and tracking computers on office networks with allocated IP addresses is simple. Individual computers' IP addresses might change from day to day as internet service providers (ISPs) assign addresses dynamically. Those distant assets can also move from home to a coffee shop or a friend's house and back, each time acquiring a new IP address. This has always been a possibility, but right now it appears to be the best option.RDP is widely used; it is a popular target for cybercriminals, and it is frequently used as the first attack vector in ransomware campaigns. Unfortunately, there's more terrible news to come. RDP accounted for 32 percent of overall security concerns discovered in scans of 50 million IP addresses connected with 50 worldwide companies in the first three months of 2021, according to the Cortex Xpanse report.Vulnerability scanners won't find these exposures if they're in IP space outside of your network, so you'll have to scan from the outside in. The mean time to inventory (MTTI) is a measurement of how quickly a company can scan for complete inventory and analyze potential risks. The most straightforward solution to ensuring that you don't have any unwanted RDP exposures is to stop RDP on any systems where it isn't required. Follow these security precautions while using RDP on systems that require it:RDP should be protected by a virtual private network (VPN).Authentication with multiple factors should be enabled (MFA). MFA enabled on all user accounts is the most effective way to limit the risk of credentials being stolen.The number of times you can log in is limited. To lessen the risk of brute force attacks, limit failed login attempts rather than allowing unlimited attempts. Authentication with multiple factors should be enabled (MFA). MFA enabled on all user accounts is the most effective way to limit the risk of credentials being stolen.The number of times you can log in is limited. To lessen the risk of brute force attacks, limit failed login attempts rather than allowing unlimited attempts.Set time restrictions for disconnected sessions and have them automatically cease when they reach their limit.Consider using an allow-list to ensure that only IP addresses that have been permitted can connect to RDP servers. Install an internet-scale Attack Surface Monitoring solution, such as Cortex Xpanse, to keep an eye on RDP or other remote access services for inadvertent exposures.RDP should be a top priority.It should be evident why RDP stands for Ransomware Deployment Protocol by now. All IT hygiene strategies should include RDP configuration as a high-priority topic. It's a protocol with harmful default settings that's simply too easy for a user to enable or utilize in dangerous ways. If RDP is not correctly configured, it will be used as an attack vector if/when your organization is targeted by ransomware operators.This isn't some hypothetical threat. In the information era, it's a simple fact of life. Unsecure RDP will be used against you at some point. Whether or not you want to expose RDP to the public, these exposures occur globally, not simply within your known IP space. This means that defenders must keep an eye on the internet for any unexpected or misconfigured implementations because attackers will undoubtedly be watching. However, securing RDP is much more than just patching systems against CVE-2019-0708. While system administrators should be rushing to safeguard their PCs against attacks, hackers are exploring computers exposed through RDP 24 hours a day, utilizing password guessing attacks. When the Morto worm used nothing more than a shortlist of common passwords, Sophos initially warned about automated assaults against RDP credentials in 2011.Need customized solutions for your business, to know more about cyber attacks and solutions? Our certified Sophos technicians are available to you at any time for your queries.Comtech Systems is one of the trusted IT solution providers in Kerala dealing with all IT infrastructure and security aspects for any business.
YOU ARE READING
Ransomware Deployment Protocol - Best protection with Sophos
RandomA Remote Desktop Protocol Attack is a form of a data breach that happens when a user's remote desktop protocol is compromised (or RDP).