Security News > 2020 > May > Malware opens RDP backdoor into Windows systems

Malware opens RDP backdoor into Windows systems
2020-05-26 10:37

A new version of the Sarwent malware can open the Remote Desktop Protocol port on target Windows computers to make sure that crooks can find their way back into the system through the backdoor.

Create a new Windows user account, enable the RDP service for it, and make changes to the Windows firewall so that RDP access to the infected machine is allowed.

Removing the malware from the infected computer will not automatically close the RDP "Hole".

Users, admins or paid "Cleaners" also have to remove the user account set up by the malware and close the RDP access port in the firewall.

Gaining access to Windows machines via the Remote Desktop Protocol has become a preferred tactic of cyber crooks and ransomware gangs, though they usually scan for machines/servers that already have RDP enabled and then they try to brute-force the passwords that safeguard access through it.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/ieZu1LoovJY/