https://www.techtarget.com/searchsecurity/tip/10-RDP-security-best-practices-to-prevent-cyberattacks
The COVID-19 pandemic has forced many organizations to rush to upgrade their networks. Some shouldered the challenge of giving employees access to office workstations and applications from their homes for the first time, while others had to handle a big increase in the number of remote connections.
The majority of organizations using Windows machines rely on Remote Desktop Protocol (RDP). This proprietary protocol developed by Microsoft is built into Windows OSes and enables remote connections to other computers. RDP opens a "listening" socket that accepts authenticated inbound connection attempts over port 3389, providing network access to a Windows machine for a remote user over an encrypted channel. Network administrators use RDP to carry out tasks and diagnose issues on remote servers, while many employees use it to log in to their organization's network to access email and files.
However, RDP is plagued with security issues. Protecting connections that use RDP is of the utmost importance for organizations today.
Unless properly secured before it is used, RDP can become a gateway for hackers to establish a foothold in the network, escalate privileges, install ransomware, or access and steal sensitive information. Unfortunately, for security teams, when attackers use a legitimate network service, it is easier for them to maintain a low profile and remain undiscovered.
Microsoft has repeatedly updated RDP -- also known on legacy platforms as Terminal Services -- but it still has weaknesses. Because it is so widely used, RDP is, and will remain, a popular attack vector for hackers. Web crawlers, such as Shodan, make it easy for attackers to quickly identify misconfigured RDP ports and vulnerable public-facing machines.
Brute-force attacks against RDP, where an attacker tries to gain system access through automated authentication attempts and man-in-the-middle (MitM) attacks, are widespread. Additionally, a lot of malware, such as Ryuk, Sodinokibi and GandCrab, incorporate RDP modules. Both the RobinHood ransomware attack against the city of Baltimore and the SamSam attack against the city of Atlanta were RDP-originated attacks, while the BlueKeep RDP vulnerability enables cybercriminals to remotely take over connected PCs that are not properly patched.
Because of these ongoing risks, organizations must understand how RDP works and adopt RDP security best practices to protect their networks and maintain data security. For example, all RDP instances should require multiple levels of access and authentication controls. Using a VPN to access an RDP instance, while requiring a second factor for authentication, should also be in place.
Below is a list of cost-effective RDP security best practices that IT leaders should consider implementing at their organizations:
Even with a strong password policy and multifactor authentication in place, RDP should never be open to the internet as it makes networks vulnerable to denial-of-service attacks and user account lockout. Once the above RDP security best practices are in place, be sure to scan the network to look for any RDP instances still directly exposed to the internet and fix them.
Even if RDP is not needed, perform regular checks to ensure RDP ports remain secured. It is critical to be aware that, while RDP is built into Microsoft OSes, it can also be installed on Apple, Linux and Android OSes.
18 Aug 2020