
If you use a different remote-access protocol, admins still cannot relax, says Kaspersky: At the end of last year, its researchers found 37 vulnerabilities in various clients that connected via the VNC protocol, which, like RDP, is used for remote access. if you don’t use RDP, disable it and close port 3389.if possible make employees use two-factor authentication.use Network Level Authentication (NLA).make RDP available only through a corporate VPN.at the very least verify that employees use strong passwords.Kaspersky says administrators who allow RDP to be used should By comparison, the jump that started around March 10th in China has steadily grown. there was a leap around March 10, followed by a huge spike on April 6th. The numbers released cover seven countries: The U.S., Italy, Germany, Spain, France, Russia and China. “As far as we can tell, following the mass transition to home working, they logically concluded that the number of poorly configured RDP servers would increase, hence the rise in the number of attacks,” the report says.īrute force attacks can be based on combinations of random characters or a dictionary of popular or compromised passwords, it adds.
BRUTE FORCE PORT 3389 WINDOWS
In a report released Thursday security vendor Kaspersky Labs said that since the beginning of March - roughly when organizations began insisting people work from home due to the COVID-19 pandemic - hackers’ attempts to force their way into Windows systems through brute force credential attacks have jumped significantly.

Infosec pros are being warned to make sure Windows systems are locked tightly down after evidence emerged that generic brute force attacks on computers and servers allowing access through Microsoft’s remote desktop protocol have recently skyrocketed.
