• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity  /  How to prevent Remote Desktop Protocol (RDP) attacks
How to prevent Remote Desktop Protocol (RDP) attacks
03 December 2018

How to prevent Remote Desktop Protocol (RDP) attacks

Written by Ankita Ashesh
Ankita Ashesh
Cybersecurity
12
Shares

Remote Desktop Protocol (RDP) attacks can be extremely dangerous, whether from an enterprise or a single user point of view. They are basically backdoors which allow external users to access and use a system over the Internet. The United States’ Federal Bureau of Investigation (FBI) has defined RDP as, “a proprietary network protocol that allows an individual to control the resources and data of a computer over the Internet. This protocol provides complete control over the desktop of a remote machine by transmitting input such as mouse movements and keystrokes and sending back a graphical user interface.”

RDPs can actually have several benefits. It can allow users to access their systems and do urgent or critical work when they are away. Unfortunately, unsecured RDPs are exploited by criminals to access enterprise networks. It is a top vector for ransomware – the SamSam ransomware attack infected close to 10,000 systems of LabCorp through a brute force attack on an RDP server. Other forms of an attack exploiting RDPs were CrySIS Ransomware, CryptOn Ransomware with Dark Web Exchange of stolen RDP login credentials.

A spate of RDP attacks

Other forms of ransomware attack through RDP brute force vectors are the Dharma ransomware outbreak, Lime ransomware, the Morto worm, a variant of Troldesh ransomware, Shrug2 and many many more. While Seqrite’s range of services are well-equipped to handle these type of attacks with the company recently revealing that it has successfully blocked more than 35,000 RDP-based based attacks on Indian enterprises every day, we cannot afford to be complacent as new variants are continuously emerging. In fact, the FBI also recently released an advisory highlighting these kinds of attacks and educating the public about them.

Some of the chief causes of RDP attacks are the following:

  • Weak passwords which can be easily crackable or guessable making it even easier for criminals to access a system
  • Outdated versions of RDP which are prone to new vulnerabilities
  • Unrestricted access allowed to RDP ports
  • Unlimited login attempts allowed to a RDP port

Seqrite products help in preventing these kind of attacks due to the following specialized features:

  1. Anti-Ransomware
    Specially designed to counter ransomware attacks. This feature detects ransomware by tracking its execution sequence.
  2. Firewall
    Blocks malicious attempts to breach network connections.
  3. IDS/IPS
    Detects RDP brute force attempts and blocks the remote attacker IP for a defined period.
  4. Virus Protection
    Online virus protection service detects the known variants of the ransomware.
  5. Behavior-based Detection System
    Tracks the activity of executable files and blocks malicious files.
  6. Back Up and Restore
    Helps you take regular backups of your data and restore it whenever needed.

But don’t become complacent

However, it is always a good idea to follow certain precautions as well:

  • Disable or minimize RDP use as much as possible

At its very core, RDPs can be dangerous and it is best to minimize usage of it as much as possible or in the best case scenario, disable it if it is not needed. If required, minimize usage as much as possible and follow very strict precautions.

  • Back-up data regularly

Back up your important data regularly and keep a recent backup copy offline. Encrypt your backup. If your computer gets infected with a ransomware, your files can be restored from the offline backup once the malware has been removed.

  • Use strong passwords

Use passwords with a mix of alphanumeric and uppercase-lowercase characters making it even tougher to be cracked. Two-factor authentication is an additional security measure which can be deployed.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous PostWhy should you say NO to ransomware demands!
Next Post  CVE-2018-15982- Adobe Flash Player use after free (Zero Day) vuln...
Ankita Ashesh

About Ankita Ashesh

...

Articles by Ankita Ashesh »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies