Remote Desktop Protocol (RDP) is a communication protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. Once connected, the remote user will be able to communicate with the machine using their input devices, keyboard and mouse, and to have their screen displaying the output of their actions – as if they were physically connected. Simply put, gaining access to your crown jewels.
Common use of this protocol would be IT personnel performing maintenance, or support teams providing training and assistance to end-users. It is also a useful tool for remote employees who want to connect the organization’s resources.
The protocol gained popularity, that naturally increased during COVID-19 as most organizations moved to working from home; however, it was also noticed by malicious actors, who saw this as an opportunity to access organizations’ internal networks, steal or corrupt information.
RDP as a vulnerability
As a result of the exclusive capabilities RDP enables once in-use, RDP servers became an attractive target for cybercriminals. The first stage of an attack in which this protocol is leveraged must include the detection on an internet-connected RDP server. The selection for detection tools is large, ranging from legitimate PT port scanning tools such as Nmap, to shady port scanners shared within the threat actors’ community. These scanners flag IPs that have an open port 3389, the default RDP port. Then, the vulnerable server will face 1 out of 3 main attack vectors, depending on the sophistication and experience level of the attacker:
In the past few years, the cyber-security community discovered several critical exploits (risk rate is 9.8), that render RDP servers vulnerable to remote code execution:
- May 2019: BlueKeep (CVE-2019-0708)
- August 2019: DejaBlue (CVE-2019-1181 and CVE-2019-1182)
- January 2020: BlueGate (CVE-2020-0609 and CVE-2020-0610)
From authentication perspective, obtaining the credentials of an RDP server is a similar effort to other ATO attempts, using brute-force tools and dictionary attacks. Threat actors that choose this methodology rely on the unfortunate habit of using default or weak passwords.
Even with poor technical skills, a beginner could register to one of the many dark web marketplaces, and purchase RDP access. These were likely obtained through one of the methods above, and are sold for a limited timeframe. The listings start from surprisingly low prices, only a few dollars, and get higher according to machine’s geo-location, its content, and what it has access to.
Listing on an RDP designated section on an underground forum
CASE STUDY - RDP ACCESS FR SALE
As part of its online monitoring, Cyberint identified an RDP access for a server of a home furniture retailer, which is offered for sale in an online marketplace.
In the listing, the threat actor mentions that the hacked RDP server in question contains a back-up database. Furthermore, the TA provides 3 screenshots allegedly taken from the compromised machine, as an evidence for the compromise; one of them shows the properties window of a 15.3 GB DB.
Once purchased, the information disclosed by the screenshot and the rest of the machine’s content are at risk of theft and/or corruption. It is worth mentioning that besides the business impact, such attack can also harm the customers of the retailer, which may result it customer churn and lawsuits.
Now more than ever, in the times of COVID-19, organizations around the world are relying on the RDP protocol for effective and productive work environment. Nevertheless, the protocol has several security flaws that make it a popular target of malicious actors. In order to avoid the potential risk of using RDP, Cyberint recommends taking the following precautions:
- Reduce the number of RDP servers which are internet-exposed to the possible minimum. As internet connection is the key for every RDP attack, it is highly recommended to restrict the access to the server only for whitelisted IPs. Organizations should pay extra attention to DMZ (demilitarized zone), non-compliant cloud environments and new machines deployed by non-security personnel.
- In case a server must be publicly available, it is recommended to implement another measure of multifactor authentication. Those servers should be vigilantly monitored, and any suspicious connection attempt should be flagged and analyzed within the organization. Please note that this practice may protect the server only from compromise credentials attacks. If a vulnerability exists, MFA would be useless.
- Make sure all in-use technologies are patched and in their latest version.
- Set high-quality password policy, instructing users to choose complex, long passwords.