Cyberattacks targeting Remote Desktop Protocols (RDPs) used by employees to access corporate resources remotely is increasing at an alarming pace.

Infographics - Cyberattacks on RDP
Download Infographic

Download and share the infographic for free with employees.

Cybercriminals exploit one vulnerable RDP server to gain an initial foothold into an organisation and spread laterally to build their botnet. Once a network of bots is created, cybercriminals can perform a range of actions, including:
  • Exfiltrating login credentials and other sensitive data
  • Uploading Trojan malware to the server, which opens a backdoor to the system while masquerading as legitimate software
  • Launching Distributed Denial of Service (DDoS) attacks
  • Deploying ransomware attacks

We recommend the following:

  1. Encourage users to use strong passwords that are difficult to guess with brute force attacks. 
  2. Enable access to RDP through a corporate VPN.
  3. Facilitate Network Level Authentication (NLA) for remote network connections. 
  4. Enable Multi-Factor Authentication across the network.
  5. Ensure that every employee is using the latest versions of Operating Systems and software.