URL has been copied successfully!
Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Attackers Abuse Remote Desktop Protocol, Microsoft Binaries

Investigators See Ongoing Use of Living-Off-the-Land Binaries, Frequent RDP Abuse. Incident responders studying last year’s top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.

First seen on govinfosecurity.com

Jump to article: www.govinfosecurity.com/attackers-abuse-remote-desktop-protocol-microsoft-binaries-a-27934

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link