Common Information
Type Value
Value
Remote Desktop Protocol - T1076
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS). (Citation: TechNet Remote Desktop Services) There are other implementations and third-party tools that provide graphical access Remote Services similar to RDS. Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the Accessibility Features technique for Persistence. (Citation: Alperovitch Malware) Adversaries may also perform RDP session hijacking which involves stealing a legitimate user's remote session. Typically, a user is notified when someone else is trying to steal their session and prompted with a question. With System permissions and using Terminal Services Console, <code>c:\windows\system32\tscon.exe [session number to be stolen]</code>, an adversary can hijack a session without the need for credentials or prompts to the user. (Citation: RDP Hijacking Korznikov) This can be done remotely or locally and with active or disconnected sessions. (Citation: RDP Hijacking Medium) It can also lead to Remote System Discovery and Privilege Escalation by stealing a Domain Admin or higher privileged account session. All of this can be done by using native Windows commands, but it has also been added as a feature in RedSnarf. (Citation: Kali Redsnarf) Detection: Use of RDP may be legitimate, depending on the network environment and how it is used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP. Monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time. Also, set up process monitoring for <code>tscon.exe</code> usage and monitor service creation that uses <code>cmd.exe /k</code> or <code>cmd.exe /c</code> in its arguments to prevent RDP session hijacking. Platforms: Windows Data Sources: Authentication logs, Netflow/Enclave netflow, Process monitoring Permissions Required: User, Remote Desktop Users System Requirements: RDP service enabled, account in the Remote Desktop Users group. Contributors: Matthew Demaske, Adaptforward
Details Published Attributes CTI Title
Details Website 2024-10-30 15 Jumpy Pisces Engages in Play Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-30 0 Russian Hackers Pose as Microsoft Employees in Email Phishing Attacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-30 5 Cyber Briefing: 2024.10.30
Details Website 2024-10-30 0 Russian Hackers Targeting U.S. Officials Ahead of Election, Microsoft Warns | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-30 1 Russian spies using remote desktop protocol files to phish • The Register | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-30 1 Russian spies using remote desktop protocol files to phish
Details Website 2024-10-30 3 UnderGround 랜섬웨어, 텔레그램에 탈취 정보 공개
Details Website 2024-10-30 0 Ransomware Evolution
Details Website 2024-10-30 3 A Deep-Dive into Russian Midnight Blizzard’s Campaign that Targeted Ukrainian Military, Government
Details Website 2024-10-30 0 Microsoft confirms US government officials are being targeted by notorious hackers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-30 0 Ransomware Defense: Strategies to Prevent and Recover from Attacks
Details Website 2024-10-30 7 5 Critical Threat Actors You Need to Know About - ReliaQuest
Details Website 2024-10-30 0 North Korean govt hackers linked to Play ransomware attack
Details Website 2024-10-29 0 Hackers Are Leveraging Voice AI In Cyberattacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-29 2 UAC-0215 Phishing Campaign Targets Ukraine's Critical Sectors
Details Website 2024-10-28 17 Navigating the Nmap : A Comprehensive Guide to Scan Options and Techniques
Details Website 2024-10-28 0 Verstehen und Erkennen von lateraler Bewegung - Arctic Wolf
Details Website 2024-10-28 2 Cyber Briefing: 2024.10.28
Details Website 2024-10-28 10 28th October – Threat Intelligence Report
Details Website 2024-10-28 10 28th October – Threat Intelligence Report | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-28 10 28th October – Threat Intelligence Report - Check Point Research
Details Website 2024-10-28 0 CERT-UA Identifies Malicious RDP Files in Latest Attack on Ukrainian Entities
Details Website 2024-10-28 0 HeptaX: Uncovering Cyberespionage Operations Through Unauthorized RDP Connections
Details Website 2024-10-28 25 Threat Intelligence Report October 22 - October 28 2024 | Red Piranha
Details Website 2024-10-27 0 Data Breaches, Vulnerabilities, Cyber Attacks, and Other Updates | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting