www.realvnc.com
Open in
urlscan Pro
54.187.227.204
Public Scan
URL:
https://www.realvnc.com/en/blog/the-role-of-remote-access-in-cyberattacks-and-what-you-can-do-about-it/
Submission: On September 05 via manual from GB — Scanned from GB
Submission: On September 05 via manual from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Skip to content * Support * English * Deutsch (German) * Español (Spanish) * Français (French) * Portuguese Menu * Support * English * Deutsch (German) * Español (Spanish) * Français (French) * Portuguese * VNC Connect * Solutions * Pricing * Download * Resources Menu * VNC Connect * Solutions * Pricing * Download * Resources * Sign In Menu * Sign In Free trial * VNC Connect * Products * VNC® Connect * Instant support * Device access * Home subscribers * VNC® Developer * Why VNC® Connect * Security * Pricing * Download * VNC® Server * VNC® Viewer * Single Installer * Resources * Blog * Support * Contact us * Case studies * Partners * Company * About us * Careers * English * German * Spanish * French * Portuguese Menu * VNC Connect * Products * VNC® Connect * Instant support * Device access * Home subscribers * VNC® Developer * Why VNC® Connect * Security * Pricing * Download * VNC® Server * VNC® Viewer * Single Installer * Resources * Blog * Support * Contact us * Case studies * Partners * Company * About us * Careers * English * German * Spanish * French * Portuguese * Sign In Menu * Sign In * Sign In Menu * Sign In Product overview Why VNC Connect * VNC® Connect * Device Access * Instant Support * Home subscribers * VNC® Developer Menu * VNC® Connect * Device Access * Instant Support * Home subscribers * VNC® Developer * Reliability & Performance * Security * Productivity * Flexibility * Collaboration * Support & Assistance Menu * Reliability & Performance * Security * Productivity * Flexibility * Collaboration * Support & Assistance Platforms * Windows * Mac * Linux * Raspberry Pi * Android and iOS Menu * Windows * Mac * Linux * Raspberry Pi * Android and iOS Industries * Education * Computer software * Manufacturing * Healthcare * IT and services * Communications * Transportation * Construction Menu * Education * Computer software * Manufacturing * Healthcare * IT and services * Communications * Transportation * Construction Use cases * Remote desktop * Instant customer support * Remote vendor access * Medical device access * Remote learning and training * POS device access * Remote lab access * Work from home Menu * Remote desktop * Instant customer support * Remote vendor access * Medical device access * Remote learning and training * POS device access * Remote lab access * Work from home VNC® Connect * VNC® Server * VNC® Viewer * Single Installer Menu * VNC® Server * VNC® Viewer * Single Installer Related downloads * Policy template files * VNC® Permissions Creator Menu * Policy template files * VNC® Permissions Creator Knowledge base * Support * How-to guides * Contact us Menu * Support * How-to guides * Contact us Marketing * Blog * Competitor comparisons * Marketing resources * Case studies * Partners Menu * Blog * Competitor comparisons * Marketing resources * Case studies * Partners Home » Blogs » The role of remote access in cyberattacks and what you can do about it THE ROLE OF REMOTE ACCESS IN CYBERATTACKS AND WHAT YOU CAN DO ABOUT IT You intrinsically know and believe that if you leave remote access exposed to the Internet, you increase your organization’s attack surface. * RealVNC * February 22, 2022 * 6 min read And yet, organizations utilizing as simple implementation as opening TCP port 3389 so Microsoft’s built-in Remote Desktop Services can function are doing so in droves. According to cyber insurer Coalition’s Cyber Insurance Claims Report, the number of organizations with RDP enabled when they applied for cyber insurance nearly doubled when comparing the first half of 2020 to the same period in 2021. And it makes sense to see so much remote access enabled today; organizations need to provide a way for their remote workforce to continue to be productive when working outside the office. You likely use remote access also as a means to logically move within the business network, enabling IT teams to support all of the locations remotely. But, just as you see remote access as a means to elevating the productivity of a remote workforce, the reality is that cybercriminal associations are keenly aware of this. They have found plenty of ways to take advantage of the very same benefits you now enjoy from having remote access enabled within the company. In this blog, I want to take a look at exactly how forms of remote access (that include Microsoft’s Remote Desktop Connection and even a dash of built-in tools that allow the threat actor to work entirely remotely without even gaining access to the desktop of the compromised machine) are used within cyberattacks, as well as discuss what steps you can take to mitigate the risk created through remote access. I want first to mention that despite often having differing names, such as data theft, ransomware, and malware attacks, cyberattacks tend now to use the same tactics, techniques, and procedures, with the difference being the final action that defines the specific cybercrime. So, as you read through this article and you see, say, a stat about ransomware attacks, I want you to think of ALL cyberattacks. So let’s start by looking at how Remote Access is used in cyberattacks today. 1. INITIAL ACCESS Threat actors need to gain access to your environment somehow, and there are only a few options available – generally speaking: vulnerability, phishing/social engineering, and remote access. Compromising remote access and phishing tend to vie for the top spot as the most used initial attack vector in ransomware attacks (as defined by Technique 1133 in MITRE’s ATT&CK Framework). As of Q4 2021, they were tied, according to ransomware response vendor Coveware’s Q4 2021 Quarterly Ransomware Report. And were responsible as the initial attack vector in 61% of ransomware claims for cyber insurer Hiscox. Brute force guessing of passwords (a common tactic used in conjunction with remote access) was in 78% of all ransomware attacks. In many cases, cyber attackers may have purchased user credentials on the dark web for an average of just $3 (along with the IP address to access the RDP session). 2. LATERAL MOVEMENT Once logically inside your network and after the compromised endpoint has been reconfigured to facilitate persistence and act as the threat actor’s foothold, it’s necessary to move within your network. It’s assumed that OS credential dumping is used to gather elevated credentials, which are then used via remote services (such as remotely running PowerShell sessions) or remotely connecting to the Remote Desktop Services running on other internal endpoints servers. In fact, according to Coveware, the use of Remote Services (MITRE Technique 1021) is seen in 39% of all ransomware attacks. 3. COMMAND AND CONTROL Once threat actors have access to the systems that give them entry to data, applications, and services that aid to the overarching cybercrime goals, they need easy access to a given set of systems. In many cases, threat actors use third-party Remote Access Software (which usually runs over TCP port 80 because of its lack of blocking in- and outbound traffic). According to Coveware, 63% of ransomware attacks perform Command and Control actions using Remote Access Software (MITRE Technique T1219). DOING SOMETHING ABOUT YOUR REMOTE ACCESS PROBLEM It’s evident from the industry data mentioned above that leaving any kind of build-in remote access enabled only helps the bad guys. It’s equally apparent that your organization isn’t just going to stop allowing the remote access that its employees currently enjoy. So, you’ve got to do something that balances the organization’s remote productivity and cybersecurity needs. There are a few steps you can take. * Stop Using Built-in Remote Desktop Software – regardless of what OS your endpoints are using, threat actors are all too familiar with these products (more than even your internal IT and Security teams!). And they know how to abuse a remote connection to their advantage. * No More Internet Access to Remote Desktop Software – You can use this in conjunction with step 1 above or on its own. The biggest reason for this step is that threat actors know how to scan the web for your Internet-facing remote access services (and you changing the default port has zero impact on your remote desktop service being found). * Consider Third-Party Remote Access Software – Unlike OS vendors that include some default remote access capabilities, 3rd party remote access software vendors have spent material amounts of time ensuring their product is secure. It can integrate additional security layers, which brings me to my next step… * Use Multi-Factor Authentication (MFA) – however you choose to make systems accessible across the Internet, don’t simply rely on a username/password combination. Some great MFA solutions integrate with remote access products to ensure only the owner of a credential can utilize it, keeping threat actors from logging on even with a valid credential. * Consider Zero Trust – This is a whole string of articles on its’ own, but zero trust is the concept of “never trust, always verify.” Should you go down the path of zero trust in your firm, the remote access would be scrutinized to make sure aspects of the access request (e.g., the remote IP used, the time of day, day of week, the system being accessed, and the credential being used) aren’t out of the ordinary; should they be found to be suspicious, the request for remote access is denied. MINIMIZING THE RISK. MAXIMIZING THE ACCESS. Keeping the workforce operating is paramount, but cyber attackers use the same tools and solutions. Because of the remote nature of your hybrid workforce today, it is necessary to look at how your current remote access strategy actually enables threat actors and, therefore, adds to your cyber risk – and take steps to reduce that risk. By looking at your current remote access strategy through the lens of how it’s used today in cyberattacks, you’ll begin to think about precisely where you’re aiding cyberattacks, as well as identifying what parts of your strategy would need to be better secured. Whether the answer lies in replacing your current remote access solution or simply putting additional security layers in place, you must assess where your remote access increases your risk. Extra security protocols would be so threat actors need more than just the access itself to begin the work of hacking into your environment and take the appropriate steps to thwart cyberattacks while keeping your remote workforce working. REALVNC SHARE THIS POST Share on facebook Share on twitter Share on linkedin BLOGS YOU MIGHT ALSO BE INTERESTED IN: Published: 2 September 2022 6 min read MITIGATING ZEPPELIN’S (AND ANY OTHER) MISUSE OF RDP FOR REMOTE ACCESS Read More » Published: 19 August 2022 3 min read HOW VNC CONNECT PROTECTS YOUR ORGANIZATION AGAINST THREATS, BY DEFAULT Read More » Published: 15 August 2022 4 min read 3 WAYS REMOTE ACCESS CAN MAKE OR BREAK OBTAINING CYBER INSURANCE Read More » KEEP UP TO DATE WITH EVERYTHING NEW AT REALVNC Subscribe Secure remote access trusted by professionals COMPANY * About us * Careers * Blog * News Menu * About us * Careers * Blog * News VNC CONNECT * VNC® Connect * Device access * Instant support * VNC® Developer * Home subscribers Menu * VNC® Connect * Device access * Instant support * VNC® Developer * Home subscribers GET STARTED * Start a trial * Download * Subscriptions and pricing * Buy online Menu * Start a trial * Download * Subscriptions and pricing * Buy online PARTNERS * Become a partner * Resellers * Distributors * Partner resources Menu * Become a partner * Resellers * Distributors * Partner resources SUPPORT * Help center * Service status * Contact us Menu * Help center * Service status * Contact us 4.7 stars, 400+ reviews Top 50 IT Management Products 2020 4.8 stars, 11,700 reviews Apple store 5M+ downloads 4.6 stars, 55,000 reviews Google play store 5M+ downloads 4.5 stars, 100+ reviews Best Software Reviews Platform 4.7 stars, 400+ reviews Top 50 IT Management Products 2020 4.8 stars, 11,700 reviews Apple store 5M+ downloads 4.6 stars, 55,000 reviews Google play store 5M+ downloads 4.5 stars, 100+ reviews Best Software Reviews Platform 4.7 stars, 400+ reviews Top 50 IT Management Products 2020 4.8 stars, 11,700 reviews Apple store 5M+ downloads 4.6 stars, 55,000 reviews Google play store 5M+ downloads 4.5 stars, 100+ reviews Best Software Reviews Platform Copyright © 2002-2022 RealVNC® Limited. All rights reserved. RealVNC®, VNC® and RFB® are trademarks of RealVNC® Limited. * Privacy policy * Trademarks * Patents * Refunds * T&Cs * EULAs Menu * Privacy policy * Trademarks * Patents * Refunds * T&Cs * EULAs RealVNC® uses cookies. For more information, please read our privacy policy. Got it