Get a Pentest and security assessment of your IT network.

News

Windows Remote Desktop Services Used for Fileless Malware Attacks

Threat actors breaching company networks are deploying a cornucopia of malware over the remote desktop protocol (RDP) without leaving a trace on target hosts. The attackers leveraged a feature in Windows Remote Desktop Services that allows a client to share local drives to a Terminal Server with read and write permissions. When an RDP session terminates, so do associated processes and memory is typically released. When that session ends, associated processes are typically released, so are associated processes. The payloads are executed in RAM using a remote connection, which also serves for exfiltrating useful information.

Source: https://www.bleepingcomputer.com/news/security/windows-remote-desktop-services-used-for-fileless-malware-attacks/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Webroot Impact of Web-borne threats on businesses

News

UK NCSC warns of cyber attacks powered by Russia against the political system