A huge uptick in brute force attacks designed to crack the login credentials of those using remote access tools has been detected by Kaspersky.
This is particularly taking place against firms using Microsoft’s proprietary Remote Desktop Protocol (RDP). Staring in March the average daily number of attacks against RDP accounts skyrocketed in almost every country that has been heavily impacted by COVID-19 and thus has a new WFH population.
“Attacks of this type are attempts to brute-force a username and password for RDP by systematically trying all possible options until the correct one is found. The search can be based on combinations of random characters or a dictionary of popular or compromised passwords,” Kaspersky said.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.