skip to Main Content

Cybercrime, coronavirus-related brute force RDP attacks are rising

Kaspersky: Cybercrime coronavirus-related remote desktop protocol (RDP) attacks on corporate environments has increased significantly over the past couple of months. This thanks to the lockdown and the remote working

Cybercrime coronavirus-related remote desktop protocol (RDP) attacks on corporate environments has increased significantly over the past couple of months. It has been denounced by Kaspersky cyber security experts. Especially, after the covid-19 pandemic introduced worldwide the remote working. Alongside the higher volume of corporate traffic, the use of third-party services for data exchange, and employees working on home computers (and potentially insecure Wi-Fi networks), the number of people using remote-access tools has increased. One of the most popular application is RDP, since the beginning of March ever more exploited by criminal hackers at global level. Attacks of this type are attempts to brute-force a username and password for RDP by systematically trying all possible options until the correct one is found. The search can be based on combinations of random characters or a dictionary of popular or compromised passwords.

The cyber security experts: Threat actors are not surgical in their approach, but operate by area. Attacks on remote-access infrastructure (as well as collaboration tools) are unlikely to stop any time soon

According to the cyber security experts, brute-force attackers are not surgical in their approach, but operate by area. Cybercrime, following the mass transition to home working, logically concluded that the number of poorly configured RDP servers would increase, hence the rise in the number of aggressions. Attacks on remote-access infrastructure (as well as collaboration tools) are unlikely to stop any time soon. Tre trend, in fact, shows that the daily attempts per country grew to nearly 1 million in the month in some nations. In others, they spiked well above the million mark.

Back To Top