Attacks on remote desktop protocols soared this year

Remote desktop
(Image credit: Microsoft)

Cybersecurity firm Kaspersky has found that attacks on remote desktop protocols (RPD) grew by a staggering 242% compared to last year, with threat actors clearly seeing an opportunity in the mass transition to remote working.

Kaspersky researchers gathered evidence that attackers were clearly targeting home workers. In addition to the huge increase in the number of brute force attacks on RPD, 1.7 million unique malicious files were disguised as apps for corporate communication.

As a result of the coronavirus pandemic, many businesses had to rapidly enable remote working, meaning that security protocols often took a backseat. In addition to many employees using third-party solutions to share corporate data, unsecured Wi-Fi networks were often utilized to work from non-office environments.

A steep learning curve

“This year taught us a lot,” Dmitry Galov, a security researcher at Kaspersky, commented. “The move online was not as flawless as one would imagine, especially given that we already lived in what we thought was a digitized world. As the focus switched to remote work, so did the cybercriminals, who directed their efforts to capitalize on a rise in adoption. I am happy to state that the adoption process was fast and this meant the world could go on. Economies did not freeze and we still get to have our coffee, albeit, via delivery services. Yet now we know that there is still a lot to learn about the responsible use of technology, with data sharing at the heart of it.”

As we move into a post-pandemic world, it is possible that the increase in remote working may continue. If so, both employees and businesses should become better prepared for the battle against cyberattackers.

Kaspersky recommends that corporate VPNs are installed, multi-factor authentication employed, and all devices kept up-to-date as methods that should be implemented by security-conscious organizations.

Barclay Ballard

Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services.  After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things. 

Latest in Security
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Latest in News
FiiO FX17 IEMs
Our favorite budget audiophile brand unveils wired earbuds with 26(!) drivers, electrostatic units, USB-C ultra-Hi-Res Audio, and a not-so-budget price
Nvidia RTX 5080 against a yellow TechRadar background
RTX 5080 24GB version teased by MSI - is it time to admit that 16GB isn't enough for 4K?
girl using laptop hoping for good luck with her fingers crossed
Windows 11 24H2 seems to be a massive fail – so Microsoft apparently working on 25H2 fills me with hope... and fear
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
ChatGPT Advanced Voice mode on a smartphone.
Talking to ChatGPT just got better, and you don’t need to pay to access the new functionality
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight