Full width home advertisement

Welcome Home

Post Page Advertisement [Top]

 Remote Desktop Cyber Attacks

Remote Desktop

What is Remote Desktop

Remote Desktop is an application software or operating system software that allows a personal computer's desktop environment to be run remotely on another system, while being displayed on a separate client device.   

Remote Desktop Protocol (RDP) attack attempts rose to a number of 768 percent last year


As many employees all around the world were busy making the transition of working from home last year, cybercriminals were active and quick to capitalize on the fact that their home networks lacked the good security and safeguards that is found on corporate networks.

While some of the workers used VPN services to connect to their corporate networks, many relied only on remote desktop software including the Microsoft's Remote Desktop Protocol (RDP) which comes included with Windows 10. 

Due to the very high number of users that are leveraging RDP, the cybersecurity firm ESET saw a record of about 768 percent increase in RDP attack attempts last year, according to its Q4 2020 Threat Report.

The Chief research officer at ESET, whose name is Roman Kováč had an interview and explained in a press release how cybercriminals often make use of the RDP as a means to deploy ransomware, saying:

The Remote Desktop Protocol (RDP) security is not to be underestimated especially due to the strange happenings, the ransomware, which is commonly now deployed through The Remote Desktop Protocol (RDP) exploits, and with its heavy increasingly aggressive tactics that it is using, it is now posing a heavy risk to both the public sectors and the private sectors. As the security of remote work gradually improves, the massive boom in attacks exploiting RDP is expected to slow down – we have already seen some signs of this in Q4. 

Top Remote Desktop Threats


Viruses are a leading and common threat to all forms of software including Remote Desktop Applications


Spyware is designed to steal and profit from or capture your personal or sensitive information or data. Spywares run like an invisible virus that runs silently in the background to steals your information.


Computers and computer systems were created to make our lives easier. When it comes down to it, hackers are predators who prey on regular people by breaking into computers, servers, networks and systems to steal and destroy personal and sensitive information for their own gain. 



Phishing is acting like a different person or posing as a business that you already trust. Phishers also attempt to get sensitive data like logins or financial information. 

The Year 2020 Threats

ESET's Q4 2020 Threat Report also offers a further insight on how the cybersecurity firm has taken part in a global disruption campaign also involving the Microsoft, Lumen's Black Lotus Labs,  NTT, FS-ISAC and Broadcom's cybersecurity division Symantec to take down the TrickBot. 

By working with joint force together to disrupt one of the largest and longest-lived botnets, the firms coordinated joint efforts resulted in a 94 percent of TrickBot's servers being taken down just in a single week.

The Q4 2020 Threat Report also goes into detail about how ESET researchers has discovered a previously unknown APT group that is named XDSpy which has been targeting the Balkans and Eastern Europe as well as how the firm discovered a remarkable number of supply chain attacks in last year.

No comments:

Post a Comment

Bottom Ad [Post Page]