Security News > 2020 > May > How to combat cyberattacks that exploit Microsoft's Remote Desktop Protocol

In many cases, IT staff and other employees need to remotely connect to workstations and servers at the office, and for that they typically rely on the Microsoft Remote Desktop Protocol built into Windows.
In a blog post published on Thursday, McAfee explains how cybercriminals are taking advantage of RDP access and what organizations can do to protect themselves.
In its blog post "Cybercriminals Actively Exploiting RDP to Target Remote Organizations," McAfee explained that RDP often runs on Windows servers, including web servers and file servers.
In January, Microsoft also had to fix flaws related to the Remote Desktop Gateway, which is used to secure remote connections.
Criminals who gain remote access to an organization through RDP can use it for a variety of nefarious purposes.
News URL
Related news
- Microsoft replacing Remote Desktop app with Windows App in May (source)
- Microsoft isn't fixing 8-year-old shortcut exploit abused for spying (source)
- Microsoft: Recent Windows updates cause Remote Desktop issues (source)
- Android Malware Exploits a Microsoft-Related Security Blind Spot to Avoid Detection (source)
- Microsoft fixes Remote Desktop issues caused by Windows updates (source)
- Microsoft fixes Remote Desktop freezes caused by Windows updates (source)
- Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp (source)
- Oh, cool. Microsoft melts bug that froze Server 2025 Remote Desktop sessions (source)