Ransomware using Remote Desktop to spread itself

According to an article over at SC Magazine, hackers are using brute force to crack their way into Remote Desktop / Terminal Servers and installing a CryptoLocker type malware that is encrypting the files on the server.

The blog was alerted to the malware by users on its support forum. The ransomware appears to be installed directly by the attacker who brute forces weak passwords on computers running Remote Desktop or Terminal Services.

This makes perfect sense. Why bother with trying to trick employees into clicking on a fake link to install malware when you can go directly after a server.

Take Precautions 

  1. If you don’t need RDS then disable it on all servers
  2. Don’t have RDS exposed directly to the Internet. Require VPN access to get to any internal servers
  3. Implement account lockout on all user accounts
  4. Use 2 Factor Authentication to log into servers via RDS or Citrix
badge w light burst white (1)
Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

More on blogs

Turning Output Overwhelm Into Productivity

Can AI Productivity Become Too Much? The Rise of Output Overwhelm

AI is helping teams move faster than ever, but more output doesn’t always mean more progress. As idea generation accelerates, many organizations are struggling to

5 Real Incidents That Show How AI Can Accidentally Leak Company Data

Employees are using AI tools like ChatGPT to work faster, but without oversight, it’s creating a new risk called Shadow AI. From leaked source code
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: