{"id":24198,"date":"2024-03-20T11:23:02","date_gmt":"2024-03-20T19:23:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/20\/news-17928\/"},"modified":"2024-03-20T11:23:02","modified_gmt":"2024-03-20T19:23:02","slug":"news-17928","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/20\/news-17928\/","title":{"rendered":"Remote Desktop Protocol: The Series"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:18:21 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\" width=\"100%\" height=\"420\">\n<p><span data-contrast=\"auto\">Remote Desktop Protocol (RDP) was developed by Microsoft to allow users, administrators, and others to connect to remote computers over a network connection using a handy graphical user interface (GUI). The tools required for this come as standard on Microsoft Windows; to initiate and set up an RDP connection, all the tools required to do that are present by default. This is why RDP is used extensively throughout networks by users and administrators to access remote machines.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Unfortunately, it&#8217;s also commonly abused by ransomware groups \u2013 so commonly, in fact, that in our regular Active Adversary Reports our editors are forced to treat RDP differently in graphics so other findings are even visible. And RDP abuse is on the rise, as we see in Figure 1 &#8212; numbers from the past few years of incident-response data as collected by the Active Adversary Report team. In the edition of the report we\u2019ll be releasing next month, you\u2019ll see that RDP has now cracked the 90 percent mark \u2013 that is, nine out of ten IR cases include RDP abuse.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-954299\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png\" alt=\"A bar chart showing the increase in RDP abuse from 2021 to 2023\" width=\"640\" height=\"374\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png 1665w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png?resize=300,175 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png?resize=768,448 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png?resize=1024,598 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/2402-RDP-abuse-logo.png?resize=1536,897 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><i><span data-contrast=\"auto\">Figure 1: A first look at the full Active Adversary dataset from 2023 shows that RDP abuse is getting worse<\/span><\/i><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Today, to provide context and advice for administrators and responders looking to deal with RDP, we\u2019re publishing an entire package of resources \u2013 videos, companion articles with additional information, and a constellation of additional scripts and information on our GitHub repository. We\u2019re doing this both to share our Active Adversary team\u2019s research beyond the usual long-form reports we issue, and to provide what we hope is a useful set of resources for handling one of infosec\u2019s more annoying chronic ailments. <\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">From an attacker\u2019s point of view, targeting RDP is a natural choice. Most significantly, it\u2019s a Microsoft-provided tool (so, a living-off-the-land binary, or LOLBin) that blends in with typical user and administrative behavior. Its usage alone isn\u2019t apt to draw attention if no one\u2019s keeping an eye out for it, and an attacker need not bring in additional tools that may be detected by EDR or other anti-intrusion tools. RDP also has a relatively pleasant graphical user interface that lowers the skill barrier for attackers to browse files for exfiltration, and to install and use various applications.\u00a0<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Attackers also know that RDP is commonly misconfigured or misused within an environment, both on servers and occasionally on endpoints themselves. The next article in this RDP collection looks at just how common such exposure is, and whether measures such as switching off RDP\u2019s usual 3389 port makes a difference. (Spoiler: No.)\u00a0<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Rounding out the dismal RDP picture, we see self-owns such as lack of segregation, use of weak credentials, disabling (by administrators) of potential protections such as <\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/cc732713(v=ws.11)\"><span data-contrast=\"none\">NLA (network-level authentication)<\/span><\/a><span data-contrast=\"auto\">, and flagrant disregard for best practices such as least privilege. On the brighter side, there are useful, sturdy queries that can give great insight into precisely how RDP is in use on your network\u2026 if you know where to look.<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So, to provide context and advice for administrators and responders looking to deal with RDP, we\u2019re starting with an entire package of resources \u2013 six videos, six companion articles with additional information, and a constellation of additional scripts and information on our GitHub \u2013 with more to be added over time as events dictate.\u00a0<\/span><span data-ccp-props=\"{&quot;335559739&quot;:360}\">\u00a0<\/span><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"100%\" height=\"420\" src=\"https:\/\/www.youtube.com\/embed\/dmzfBSs02lA?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\" frameborder=\"0\"><\/iframe><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Remote Desktop Protocol: The Series<\/strong><\/p>\n<p>Part 1: Remote Desktop Protocol: Introduction ([you are here], <a href=\"https:\/\/youtu.be\/dmzfBSs02lA\">video<\/a>)<br \/> Part 2: Remote Desktop Protocol: Exposed RDP (is dangerous) (<a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-exposed-rdp-is-dangerous\/\">post<\/a>, <a href=\"https:\/\/youtu.be\/XyWnKaLwmkQ\">video<\/a>)<br \/> Part 3: RDP: Queries for Investigation (<a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-queries-for-investigation\/\">post<\/a>, <a href=\"https:\/\/youtu.be\/-Vo_Gok59WE\">video<\/a>)<br \/> Part 4: RDP Time Zone Bias (<a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-how-to-use-time-zone-bias\/\">post<\/a>, <a href=\"https:\/\/youtu.be\/gaq46NUkOyA\">video<\/a>)<br \/> Part 5: Executing the External RDP Query (<a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-executing-the-external-rdp-query\/\">post<\/a>, <a href=\"https:\/\/youtu.be\/hGKvzkb47JA\">video<\/a>)<br \/> Part 6: Executing the 4624_4625 Login Query (<a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-executing-the-4624_4625-login-query\/\">post<\/a>, <a href=\"https:\/\/youtu.be\/YpvAnSEk8HU\">video<\/a>)<br \/> GitHub query repository: <a href=\"https:\/\/github.com\/SophosRapidResponse\/OSQuery\/tree\/main\/Artefacts\/Logins\">SophosRapidResponse\/OSQuery<br \/> <\/a>Transcript repository: <a href=\"https:\/\/github.com\/sophoslabs\/video-transcripts\">sophoslabs\/video-transcripts<br \/> <\/a>YouTube playlist: <a href=\"https:\/\/www.youtube.com\/playlist?list=PLW9m2f_dtUOVVita1zUhzv4T-VSzxUAUZ\">Remote Desktop Protocol: The Series<\/a><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/03\/20\/remote-desktop-protocol-the-series\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/03\/rdp-hero-01.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:18:21 +0000<\/strong><\/p>\n<p>What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25396,129,12657,27362,25038,18324,24552,27030,16771],"class_list":["post-24198","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-active-adversary","tag-featured","tag-incident-response","tag-incident-response-tools","tag-mdr","tag-rdp","tag-security-operations","tag-sophos-x-ops","tag-threat-research"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24198"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24198\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24198"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}