DDoSers are abusing Microsoft RDP to make attacks more powerful

Stylized illustration of a hooded figure at a laptop.

Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protection (credit: Getty Images)

DDoS-for-hire services are abusing the Microsoft Remote Desktop Protocol to increase the firepower of distributed denial-of-service attacks that paralyze websites and other online services, a security firm said this week.

Typically abbreviated as RDP, Remote Desktop Protocol is the underpinning for a Microsoft Windows feature that allows one device to log into another device over the Internet. RDP is mostly used by businesses to save employees the cost or hassle of having to be physically present when accessing a computer.

As is typical with many authenticated systems, RDP responds to login requests with a much longer sequence of bits that establish a connection between the two parties. So-called booter/stresser services, which for a fee will bombard Internet addresses with enough data to take them offline, have recently embraced RDP as a means to amplify their attacks, security firm Netscout said.

Read 8 remaining paragraphs | Comments



https://ift.tt/3okc12F

Comments