Security Week 19: bruteforce attacks on RDP

The transition of office workers to a remote site has seriously increased the burden on both public web conferencing and file sharing services and the corporate infrastructure. These are two fundamentally different troubles. Malfunctions Zoom is a problem of one service against the background of several alternative applications. There are no replacements for the company’s own services, the fall of the native mail or VPN server threatens with serious consequences. Not everyone is ready for a situation where most employees are outside the more or less built-up corporate perimeter.

Often, security suffers because of this: access to servers previously open only when working from the office is opened, protection levels for VPN, mail and file storage are removed. Such a difficult situation could not take advantage of cybercriminals. The graph above shows exactly how this happens. It demonstrates the increase in the number of attacks with brute force attacks on RDP servers (by given Kaspersky Labs). This is Russia, the study also shows graphs for other countries, but the picture is the same: an increase in the number of brute force attacks at times.

Attackers use both common default passwords and frequently used code base databases. For a well-tuned corporate infrastructure, this is not a problem, but times are difficult, the load on IT specialists is high, and there are more opportunities to make a mistake. The recommendations are standard: use complex passwords, ideally do not make the RDP server accessible from the outside, use Network Level Authorization. Last year it was the NLA made it difficult exploitation of serious vulnerabilities in the protocol. It is advisable not to include RDP at all when such access is not really required.

What else happened:
Another vulnerability in WordPress plugins. In the Real-Time Find and Replace Extension discovered A CSRF vulnerability that could allow malicious script to be injected into a website. Three plugins with which you can create educational services based on WordPress (LearnDash, LearnPress, LifterLMS), have a number of vulnerabilitiesleading to the disclosure of information, changes in user ratings and elevation of privileges up to complete control over the site.

Databases of hacked Zoom user accounts are freely sold in the cyber underground. One of the first cases of the appearance of a fairly modest collection of logins and passwords registered in the beginning of April. Last week, access was already 500 thousand accounts. Databases are either sold very cheaply or are generally distributed free of charge. Due to the ephemeral nature of newsgroups, the main threat of such leaks is the development of an attack on other network services of the company. But there are other options: the Financial Times last week fired a reporter who wrote about financial issues in competing media. He became aware of these problems after he connected to a poorly protected web conference.

The creators of the Shade ransomware trojan posted on GitHub, 750 thousand keys for decrypting data with the signature: “We apologize to all victims of the trojan.” An expert at Kaspersky Lab confirmed (see the tweet above) that the keys are working.

Vulnerability in Cisco IOS XE Software affects SD-WAN routers.

Massive Phishing Attack aimed for users of the Microsoft Teams collaboration service.

The company F-Secure described in detail vulnerability in software Salt – An open source project for managing server infrastructure.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *