Security Market Segment LS
Thursday, 18 July 2019 10:59

Sophos warns against keeping Windows machines on Net with RDP exposed


Windows machines which have the remote desktop protocol enabled received login attempts within a day of being exposed on the Internet, the British security firm Sophos says, adding that the 10 honeypots it placed received a total of 4.3 million failed login attempts in a 30-day period.

RDP is a proprietary protocol developed by Microsoft that provides a graphical interface for a network connection from a second computer. Many Windows users use it to obtain help from experts.

Sophos said in a statement that it deployed 10 honeypots, all of which were Amazon EC2 instances running default installations of Windows Server 2019. Each instance was placed in a different regional centre and login attempts were tracked between 18 April and 19 May.

While there was a belief within industry that malicious actors were using the Shodan search engine to discover Windows machines that had RPD exposed, Sophos said these individuals appeared to have their own tools to locate such machines.

The login attempts were broadly classified into three: the ram, which used limited but very frequent attacks using a few usernames to try and obtain admin access; the swarm which tried sequential usernames (A Smith, B Smith and so on) and a few of the worst passwords; and the hedgehog which was characterised by short bursts of activity.

Sophos security specialist Matt Boddy, who led the team that deployed the honeypots, said: “Most recently, a remote code execution flaw in RDP — nicknamed BlueKeep (CVE-2019-0708) — has been hitting the headlines. As reported by SophosLabs only a few weeks ago, this is a vulnerability so serious it could be used to trigger a ransomware outbreak that could potentially spread around the world in hours.

"However, securing against RDP threats goes far beyond patching systems against BlueKeep, which is just the tip of the iceberg. In addition to taking care of BlueKeep, IT managers need to pay broader attention to RDP overall because, as our Sophos research shows, cyber criminals are busy probing all potentially vulnerable computers exposed by RDP 24/7 with password guessing attacks.”

Boddy said there were more than three million Windows devices on the Internet with RDP exposed.

"It is now a preferred point of entry by cyber criminals," he said. "Sophos has been talking about how criminals deploying targeted ransomware like BitPaymer, Ryuk, Matrix, and SamSam have almost completely abandoned other methods used to break into an organisation in favour of simply brute forcing RDP passwords.

"All of the honeypots were discovered within a few hours, just because they were exposed to the Internet via RDP. The fundamental takeaway is to reduce the use of RDP wherever possible and ensure best password practice is in effect throughout an organisation. Businesses need to act accordingly to put the right security protocol in place to protect against relentless attackers.”


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments