Get a Pentest and security assessment of your IT network.

News

Windows Remote Desktop Services Used for Fileless Malware Attacks

Threat actors breaching company networks are deploying a cornucopia of malware over the remote desktop protocol (RDP) without leaving a trace on target hosts. The attackers leveraged a feature in Windows Remote Desktop Services that allows a client to share local drives to a Terminal Server with read and write permissions. When an RDP session terminates, so do associated processes and memory is typically released. When that session ends, associated processes are typically released, so are associated processes. The payloads are executed in RAM using a remote connection, which also serves for exfiltrating useful information.

Source: https://www.bleepingcomputer.com/news/security/windows-remote-desktop-services-used-for-fileless-malware-attacks/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Reflection of cyber-attack to Wells Fargo in world media

News

CVE-2016-6563 RCE flaw affects D-Link Routers, disable remote admin