October 6, 2016 By Douglas Bonderud 2 min read

Trojan-laden malware remains a huge problem for enterprises and individual users alike. As noted by Palo Alto Networks, some cybercriminals are targeting users with creative Mac OS X malware that uses a PDF detailing Russian space program projects over the next decade as a decoy to infect systems with information-stealing code.

Softpedia, meanwhile, reported that enterprises have more to fear from a new set of brute-force remote desktop protocol (RDP) attacks that use a backdoor Trojan to infect connected servers and grab everything from banking credentials to tax data and browser cookies. Here’s a look at the new RDP risk.

Dangerous Desktops

Microsoft developed RDP to enable out-of-office workers to connect with desktop PCs. This capability is essential in corporate environments where users are accustomed to full mobile privileges and remote, 24/7 access. Users only need an RDP client on their remote device, while corporate networks require RDP servers.

The problem? RDP ports are often left open, connected to the internet at large, and they leverage common username and password combinations. Softpedia noted that a new Trojan variant known as Trojan.sysscan is now scanning the web for open ports and brute-forcing these connections to gain access.

Once installed, the malware creates a hidden admin account that grants boot persistence and sets all RDP ports to permanently open, allowing for future connections or compromises. Corporate data is then collected from hosted desktops and sent using an unencrypted HTTP request to remote servers. If this fails, most attackers are brazen enough to log in and manually copy the stolen data.

Backdoor Trojan Trots Across the Globe

Security firm Guardicore, which discovered the new threat, reported that attackers commonly use IPs in the United Arab Emirates to store data and an IP in Germany to scan for any open RDP ports.

This isn’t the only RDP threat making the rounds. According to PC World, Kaspersky Lab recently discovered a brute-force RDP campaign in Brazil, called Trojan-Ransom.Win32.Xpan, which went after open RDP ports on hospital networks. Once infected, any antivirus products on the server were disabled and the Xpan ransomware was installed, encrypting all critical files and demanding a payout.

This avenue of attack is popular in Brazil, which has more compromised server details available online than any other country. Fortunately for users, Kaspersky found a way to recover the files thanks to an error in the Trojan’s original code.

Stemming the Tide

While RDP attacks are nothing new, they persist because they represent an avenue of easy opportunity for cybercriminals. Stemming the tide starts with reasonable RDP use. Whenever possible, companies need to get remote servers off the public internet and away from backdoor Trojan risk.

If leveraging an open RDP is the only way to ensure remote connection access, however, password and login rules that govern other high-value tech assets must apply. Stock credentials must be immediately changed, usernames and passwords must be unique, and these credentials should be regularly changed.

In addition, companies should invest in cloud-based monitoring tools separate from potentially compromised systems. These tools can provide warning of potential infection and help remediate RDP servers after an attack.

The bottom line is that remote desktop access increases business risk. Add in stealthy, persistent Trojans, and a brute-force attack could lead to ravaged RDP along with compromised corporate credentials.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today