Browsing tag

RDP

How to Securely Access Remote Desktop?

Having secure remote access for employees and following best practices is essential to keep your data secure. In the past few months, companies in all industries have worked intensively with the Remote Desktop Protocol (RDP) to maintain their business while maintaining physical distancing.  Since remote desktop access allows a corporate device to be accessed from […]

Hackers Changing the Main Attack Vector from RDP Compromise to Botnets For Network Breach

The ransomware evolution re-shaping the cyber domain, starting from 2019 the ransomware attacks against high-profile public and corporate networks by making criminal alliances. In 2018, threat actors behind GandCrab ransomware launched their Ransomware-as-a-Service which shifts the paradigm and turns the ransomware a full-fledged business with Branding, marketing, outreach. Threat Actor Group Truniger Truniger also known […]

First Cyberattack Spotted in Wild to Exploit Windows BlueKeep RDP Flaw

Security researchers spotted the first mass cyberattack campaign exploiting BlueKeep RDP Flaw to install a cryptocurrency miner on the vulnerable installations. Bluekeep(CVE-2019-0708) is a wormable critical RCE vulnerability in Remote desktop services that let hackers access the vulnerable machine without authentication. As vulnerability is wormable, it could rapidly compromise millions of machines in a short […]

Hackers Launching Trickbot Malware That Steals VNC, PuTTY and RDP Credentials

The new variant of infamous trickbot malware comes with the capability of grabbing remote application login credentials. Trickbot is a banking malware which steals login credentials from applications, it was discovered long back ago, the threat actors continiously adding new capabilities to the malware. Security researchers from TrendMicro observed the bew variant that bagged with […]

Flaws in RDP protocols leaving machines prone to remote code execution

Major Security Flaws Identified in RDP Protocols making Machines Prone to Remote Code Execution and Reverse RDP Attacks. Check Point researchers have identified that three remote desktop protocol (RDP) tools, which are probably the most popular ones for Windows, macOS, and Linux systems, are plagued with not one or two but twenty-five CVE-listed security flaws. […]

A Fileless Malware Called “ATMitch” Attack The ATM machines Remotely and Delete The Attack Evidence

[jpshare] A  Fileless malware “ATMitch”  Access the ATM Remotely that gave them the ability to dispense money, “at any time, at the touch of a button.” Discovered by the Researchers from Kaspersky Lab. Attackers introduced the malware on ATMs by means of the machine’s remote administration modules, something which gave them the capacity to execute commands, […]