If an attacker wants to target a specific organization, they can simply buy RDP access that has already been compromised. The UK’s National Cyber Security Centre stated that remote desktop protocol remained the “ most common attack vector used by threat actors to gain access to networks.”Īccess to RDP endpoints is also one of the most popular forms of hacking material, with thousands of access points for sale at any one time on dark web marketplaces. In 2020, security researchers at ESET found over 29 billion attempted attacks on RDP, an increase of 768%. ![]() The large increase in workers using remote desktop protocol during the Covid-19 lockdowns and ongoing WFH provided hackers with even more vulnerable endpoints to try and compromise. ![]() However, the access that RDP gives to users can also be used by attackers to infiltrate networks.
0 Comments
Leave a Reply. |