In an attacker’s ideal world, he or she would infect a desktop, steal the user’s RDP password and move smoothly across the network to the RDP server and immediately gain access. In real life however, things can get a little more complicated.
In an attacker’s ideal world, he or she would infect a desktop, steal the user’s RDP password and move smoothly across the network to the RDP server and immediately gain access. In real life however, things can get a little more complicated.
Reports from security researchers show that an army of thousands of infected computers is used by cybercriminals to detect point-of-sale (POS) terminals that are accessed via the remote desktop protocol (RDP) with credentials that can be cracked through brute-force attacks.Earlier today, security company IntelCrawler presented a report showing that cyber-crooks compromised computers that were used […]
Kaspersky reports that brute force attacks against RDP servers are on the rise. But they don’t work unless you have done a poor job securing your server.
Latest Comments