For servers with Windows Server
Syspeace v4
Prevent brute force attacks on your Windows Server
Remote Desktop Protocol (RDP) is a fast-increasing attack vector to enterprise networks. Due to the recent pandemic, employees had to move their workstations from their offices to their homes, which decreased the usual security implemented.
Windows uses Remote Desktop Protocol (RPD) for remote connection to a server, as when employees are working from different locations, such as their homes. The RDP client on the user’s computer communicates (encrypted) with the RPD component on the server.
Since it originated in 1998, RDP has been a weak link since the remote endpoints are vulnerable to hackers. Over the years there have been countless attacks by different malware types, brute-force attacks, etc. Researchers are continuously finding new exploits that can put RDP users at risk.
The Windows Server does have some built-in defenses for hacking attempts, and if configured correctly, often it amounts to locking out the user. But it does nothing to stop the attack or protect the network from the intrusion attempt.
By using a Host-based Intrusion Detection and Prevention System (HIDPS), like Syspeace, to defend against brute-force attacks, and to identify, block, and protect you from the intrusion attempt.
The attack often starts with cybercriminals hacking into the RDP and logging in as a user or, in the worst case: an administrator.
They often hack the RDP connection via a brute-force attack or via an RDP port with open access to the internet.
In the brute-force attack the cybercriminals automatically try password combinations until the right one is found, acting as the user.
This is usually done when the RDP port is accessible through the internet, often via port 3389 (default port). When the security settings are not tightly configured, it becomes a vulnerable access point to the system. (As with any online system with login possibilities.)
Hackers scan connected devices for open ports, and through those, gain access to the endpoints. The endpoints, being connected to the company network, thus making them accessible to the cybercriminal.
In the era of Covid, we have seen more people work from home now than ever. These people’s computers usually have a VPN connection that connects their computer at home to the company’s internal servers.
The security of the company’s internal network is now extended to the employee’s computer at home and that computer might not always be up to date with patches and shields like anti-virus.
There is also a challenge with internal systems. Research from the Ponemon Institute found that the insider threat, attacks within the company done by employees, increased by 47% between 2018 and 2020.
Guessing the password is either done manually or automatically by any of the many tools available to brute force a RDP-connection.
When the connection is hacked, the cybercriminal can use the system for its own benefits. A lot of times, they will disable the installed antivirus and other security products, and simply upload and run the ransomware (or virus or malware).
This might include:
Your best protection is to be proactive in your defense strategy against hacking and brute force attacks. We have listed some must-have security methods beneath:
https://youtu.be/jKQD9WqBJMI How does it work? In this video, we go through how Syspeace Server IPS helps you protect servers from hacking attacks. We also demonstrate our threat activity map, which is a live view of all the hacking attempts that occur in the world that are …
Prevent brute force attacks on your Windows Server