{"id":95655,"date":"2019-06-24T09:50:08","date_gmt":"2019-06-24T16:50:08","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95655"},"modified":"2024-02-26T23:10:49","modified_gmt":"2024-02-27T07:10:49","slug":"rdp-security-explained","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/","title":{"rendered":"RDP Security Explained"},"content":{"rendered":"<h2>RDP on the Radar<\/h2>\n<p>Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708\/\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0708 or \u201cBluekeep.\u201d<\/a> The blog highlights a particular vulnerability in RDP which was deemed critical by Microsoft due to the fact that it exploitable over a network connection without authentication. These attributes make it particularly \u2018wormable\u2019 \u2013 it can easily be coded to spread itself by reaching out to other accessible networked hosts, similar to the famous EternalBlue exploit of 2017. This seems particularly relevant when (at the time of writing) 3,865,098 instances of port 3389 are showing as open on Shodan.<\/p>\n<p>Prior to this, RDP was already on our radar. Last July, McAfee ATR did a deep dive on <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/organizations-leave-backdoors-open-to-cheap-remote-desktop-protocol-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Desktop Protocol (RDP) marketplaces<\/a> and described the sheer ease with which cybercriminals can obtain access to a large variety of computer systems, some of which are very sensitive. One of the methods of RDP misuse that we discussed was how it could aid deploying a targeted ransomware campaign. At that time one of the most prolific targeted ransomware groups was SamSam. To gain an initial foothold on its victims\u2019 networks, SamSam would often rely on weakly protected RDP access. From its RDP launchpad, it would proceed to move laterally through a victim\u2019s network, successfully exploiting and discovering additional weaknesses, for instance in a company\u2019s Active Directory (AD).<\/p>\n<p>In November 2018, the FBI and the <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public\" target=\"_blank\" rel=\"noopener noreferrer\">Justice department<\/a> indicted two Iranian men for developing and spreading the SamSam ransomware extorting hospitals, municipalities and public institutions, causing over $30 million in losses. Unfortunately, this did not stop other cybercriminals from using similar tactics, techniques and procedures (TTPs).<\/p>\n<p>The sheer number of vulnerable systems in the wild make it a \u201ctarget\u201d rich environment for cybercriminals.<\/p>\n<p>In the beginning of 2019 we dedicated <a href=\"https:\/\/securingtomorrow.mcafee.com\/?s=ryuk\" target=\"_blank\" rel=\"noopener noreferrer\">several blogs<\/a> to the Ryuk ransomware family that has been using RDP as an initial entry vector. Even though RDP misuse has been around for many years, it does seem to have gained an increased popularity amongst criminals focused on targeted ransomware.<\/p>\n<p>Recent statistics showed that <a href=\"https:\/\/www.coveware.com\/blog\/2019\/4\/15\/ransom-amounts-rise-90-in-q1-as-ryuk-ransomware-increases\" target=\"_blank\" rel=\"noopener noreferrer\">RDP is the most dominant attack vector<\/a>, being used in 63.5% of disclosed targeted ransomware campaigns in Q1 of 2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95656\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/06\/Coveware-Q1-stats.png\" alt=\"\" width=\"600\" height=\"371\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Coveware-Q1-stats.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Coveware-Q1-stats-300x186.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Source: Coveware Q1 statistics<\/em><\/p>\n<h2>Securing RDP<\/h2>\n<p>Given the dire circumstances highlighted above it is wise to question if externally accessible RDP is an absolute necessity for any organization. It is also wise to consider how to better secure RDP if you are absolutely reliant on it. The good news is there are several easy steps that help an organization to better secure RDP access.<\/p>\n<p>That is why, in this blog, we will use the adversarial knowledge from the McAfee ATR red team to explain what easy measures can be undertaken to harden RDP access.<\/p>\n<p>Recommendations are additional to standard systems hygiene which should be carried out for all systems (although it becomes more important for Internet connected hosts), such as keeping all software up-to-date, and we intentionally avoid &#8216;security through obscurity&#8217; items such as changing the RDP port number.<\/p>\n<h4><strong>Do not allow RDP connections over the open Internet<\/strong><\/h4>\n<p>To be very clear\u2026 RDP should never be open to the Internet. The internet is continuously being scanned for open port 3389 (the default RDP port). Even with a complex password policy and multi-factor authentication you can be vulnerable to denial of service and user account lockout. A much safer alternative is to use a Virtual Private Network (VPN). A VPN will allow a remote user to securely access their corporate network\u00a0without exposing their computer to the entire Internet. The connection is mutually encrypted, providing authentication for both client and server, preferably using a dual factor, while creating a secure tunnel to the corporate network. As you only have access to the network you will still need to RDP to the computer but can do so more securely without exposing it to the internet.<\/p>\n<h4><strong>Use Complex Passwords <\/strong><\/h4>\n<p>An <a href=\"https:\/\/krebsonsecurity.com\/2013\/12\/hacked-via-rdp-really-dumb-passwords\/#more-23713\" target=\"_blank\" rel=\"noopener noreferrer\">often-used<\/a> alternative acronym for RDP is \u201cReally Dumb Passwords.\u201d That short phrase encapsulates the number one vulnerability of RDP systems, simply by scanning the internet for systems that accept RDP connections and launching a brute-force attack with popular tools such as, ForcerX, NLBrute, Hydra or RDP Forcer to gain access.<\/p>\n<p>Using complex passwords will make brute-force RDP attacks harder to succeed.<\/p>\n<p>Below are the top 15 passwords used on vulnerable RDP systems. We built this list based on information on weak passwords shared by a friendly Law Enforcement Agency from taken down RDP shops. What is most shocking is the fact that there is such a large number of vulnerable RDP systems did not even have a password.<\/p>\n<h4><strong>The TOP 15 used passwords on vulnerable RDP systems<\/strong><\/h4>\n<p>[no password]<br \/>\n123456<br \/>\nP@ssw0rd<br \/>\n123<br \/>\nPassword1<br \/>\n1234<br \/>\npassword<br \/>\n1<br \/>\n12345<br \/>\nPassword123<br \/>\nadmin<br \/>\ntest<br \/>\ntest123<br \/>\nWelcome1<br \/>\nscan<\/p>\n<h4><strong>Use Multi-Factor Authentication <\/strong><\/h4>\n<p>In addition to a complex password, it is best practice use multi-factor authentication. Even with great care and diligence, a username and password can still be compromised. If legitimate credentials have been compromised, multi-factor authentication adds an additional layer of protection by requiring the user to provide a security token, e.g. a code received by notification or a biometric verification. Better yet, a FIDO based authentication device can provide an extra factor which is not vulnerable to spoofing attacks, in a similar fashion to other one-time-password (OTP) mechanisms. This increases the difficulty for an unauthorized person to gain access to the computing device.<\/p>\n<h4><strong>Use an RDP Gateway<\/strong><\/h4>\n<p>Recent versions of Windows Server provide an RDP gateway server. This provides one external interface to many internal RDP endpoints, thus simplifying management, including many of the items outlined in the following recommendations. These comprise of logging, TLS certificates, authentication to the end device without actually exposing it to the Internet, authorization to internal host and user restrictions, etc.<\/p>\n<p>Microsoft provides detailed instructions for configuration of remote desktop gateway server, for Windows Server 2008 R2 as an example, over <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/cc754191(v%3dws.11)\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h4><strong>Lock out users and block or timeout IPs that have too many failed logon attempts<\/strong><\/h4>\n<p>A high number of failed logon attempts is a strong indication of a brute force attack. Limiting the number of logon attempts per user can prevent such attacks. A failed logon attempt is logged under Windows Event ID 4625. An RDP logon falls under logon type 10,\u00a0RemoteInteractive. The account lockout threshold can be specified in the local group policy under security settings: Account Policies.<\/p>\n<p>For logging purposes, it is best to log both failed and successful logons. Additionally, it is important to note that \u201cspecific security layer for RDP connections\u201d needs to be enabled. Otherwise, you will be unable to tell that the logon attempt came over RDP or see the source IP address. A comparison is shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95657\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/06\/Event-log-3.png\" alt=\"\" width=\"428\" height=\"551\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-3.png 428w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-3-233x300.png 233w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-3-388x500.png 388w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Event log network logon (type 3) note no source network address<\/em><\/p>\n<p><strong> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95658\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/06\/Event-log-10.png\" alt=\"\" width=\"471\" height=\"575\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-10.png 471w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-10-246x300.png 246w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Event-log-10-410x500.png 410w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/strong><\/p>\n<p style=\"text-align: center;\"><em>Event log RDP logon (type 10) note the source network address present<\/em><\/p>\n<h4><strong>Use a Firewall to restrict access<\/strong><\/h4>\n<p>Firewall rules can be created to restrict Remote Desktop access so that only a specific IP address or a range of IP addresses can access a given device. This can be achieved by simply opening \u201cWindows Firewall with Advanced Security,\u201d clicking on Inbound Rules and scrolling down to the RDP rule. A screen shot can be seen below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-95659\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/06\/Firewall-settings.png\" alt=\"\" width=\"753\" height=\"790\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Firewall-settings.png 753w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Firewall-settings-286x300.png 286w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Firewall-settings-477x500.png 477w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/06\/Firewall-settings-24x24.png 24w\" sizes=\"auto, (max-width: 753px) 100vw, 753px\" \/><\/p>\n<p><em>Firewall settings for inbound RDP connections<\/em><em>\u00a0<\/em><\/p>\n<h4><strong>Enable Restricted Admin Mode<\/strong><\/h4>\n<p>When connecting to a remote machine via RDP, credentials are stored on that machine and may be retrievable by other users of the systems (e.g. malicious attackers). Microsoft has added restricted admin mode which instructs the RDP server not to store credentials of users who log in. Behind the scenes, the server now uses &#8216;network&#8217; login rather than &#8216;interactive&#8217; and therefore uses hashes or Kerberos tickets rather than passwords for authentication. Assessment of the pros and cons of this option are recommended before enabling in your environment. On the negative side, the use of network login exposes the possibility of credential reuse (pass the hash) attacks against the RDP server. Pass the hash is likely possible anyway, internally, via other exposed ports so may not significantly increase exposure there, but when including this option to Internet servers, where other ports are likely (and should be!) restricted, pass the hash is then extended to the Internet. Given the pros and cons, avoiding internal escalation of privilege is often prioritized and therefore restricted admin mode is enabled.<\/p>\n<p>Microsoft TechNet describes configuration and usage of restricted mode <a href=\"https:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/32905.remote-desktop-services-enable-restricted-admin-mode.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h4><strong>Encryption <\/strong><\/h4>\n<p>There are four levels of encryption supported by standard RDP: Low, Client Compatible, High, and <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/about\/cloud-compliance\/fips-140-2-encryption-compliance-requirements.html\">FIPS Complian<\/a>t. This is configured on the Remote Desktop server. This can be further improved upon by using Enhanced RDP Security. When Enhanced RDP security is used, encryption and server authentication are implemented by external security protocols, e.g. TLS or CredSSP. One of the key benefits of Enhanced RDP Security is that it enables the use of Network Level Authentication (NLA) when using CredSSP as the external security protocol.<\/p>\n<p>Certificate management is always a complexity, but Microsoft does provide this through the use of <a href=\"https:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/1137.active-directory-certificate-services-ad-cs-introduction.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Active Directory Certificate Services (ADCS)<\/a>. Certificates can be pushed using Group Policy Objects (GPO) where this is available. Incompatible operating system environments must import certificates via the web interface exposed at https:\/\/&lt;server&gt;\/Certsrv.<\/p>\n<h4><strong>Enable Network Level Authentication (NLA)<\/strong><\/h4>\n<p>To reduce the amount of initially required server resources, and thereby mitigate against denial of service attacks, network level authentication (NLA) can be used. Within this mode, strong authentication takes place before the remote desktop connection is established, using the Credential Security Support Provider (CredSSP) either through TLS or Kerberos. NLA can also help to protect against man-in-the-middle attacks, where credentials are intercepted. However, be aware that NLA over NTLM does not provide strong authentication and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Enterprise-Mobility-Security\/Configuring-Terminal-Servers-for-Server-Authentication-to\/ba-p\/246602\" target=\"_blank\" rel=\"noopener noreferrer\">should be disabled<\/a> in favor of NLA over TLS (with valid certificates).<\/p>\n<p>Microsoft TechNet describes configuration and usage of NLA in Windows Server 2008 R2 <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/cc732713(v=ws.11)\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Interestingly, BlueKeep, mentioned above, is partially mitigated by having NLA enabled. As reported by Microsoft in the associated advisory \u201cWith NLA turned on, an attacker would first need to authenticate to Remote Desktop Services using a valid account on the target system before the attacker could exploit the vulnerability.\u201d<\/p>\n<h4><strong>Restrict users who can logon using RDP<\/strong><\/h4>\n<p>All administrators can use RDP by default. Remote access should be limited to only the accounts that require it. If all administrators do not need remote access you should consider removing the Administrator account from the RDP access group. You can then add the specific users which require access to the \u201cRemote Desktop Users\u201d group. See <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/remote\/remote-desktop-services\/rds-user-management\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> for more information on managing users in your RDS collection.<\/p>\n<h4><strong>Minimize the Number of Local Administrator Accounts<\/strong><\/h4>\n<p>Local administrator accounts provide an attack vector for attackers who gain access to a system. Credentials can be cracked offline and more accounts means more likelihood of a successful crack. Therefore, you should aim for a maximum of one local administrator account which is secured appropriately.<\/p>\n<h4><strong>Ensure that Local Administrator Accounts are Unique<\/strong><\/h4>\n<p>If the local administrator accounts match those assigned to their counterparts on other systems within the server&#8217;s internal network, the attacker can potentially re-use credentials to move laterally. This issue occurs quite frequently, so Microsoft provided Local Administrator Password Solution (LAPS) as a means to avoid this scenario across the organization with central management of unique local administrator credentials. This is particularly relevant for externally exposed systems.<\/p>\n<p>Microsoft provides a download and usage information for LAPS <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=46899\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h4><strong>Limit Domain Administrator Account Access<\/strong><\/h4>\n<p>Accounts within the domain admins group have full control of the domain by default, by virtue of being part of the administrators group for all domain controllers, domain workstations and domain member servers. If a credential for a domain admin account is retrieved from the RDP server, the attacker now holds the &#8216;keys to the kingdom&#8217; and is in full control of the entire domain. You should reduce the amount of domain administrators within the organization in general and avoid accessing the RDP server or other externally exposed systems via these accounts, to avoid inadvertently making credentials accessible.<\/p>\n<p>In general, &#8216;least privilege&#8217; administration models should be used. Microsoft provides guidance in this area, including how best to use domain admin accounts, <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=46899\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h4><strong>Consider Placement Within the Network<\/strong><\/h4>\n<p>Where possible, RDP servers should be placed within a DMZ or other restricted area of the network. The idea here is that if an attack is successful, its scope is reduced and confined to the RDP server alone. Often RDP is exposed specifically to allow external users onto the network, so this may not be a feasible solution, however it should be considered and the quantity of services reachable within the internal network should be minimized.<\/p>\n<h4><strong>Consider using an account-naming convention that does not reveal organizational information<\/strong><\/h4>\n<p>There are many options for account naming conventions, ranging from firstname.lastname to not deriving usernames from name data; all having their pros and cons. However, some of the more commonly used account naming conventions such as firstname.lastname, make it very easy to guess usernames and email addresses. This can be a security concern as spammers and hackers will readily use this information.<\/p>\n<h2>Conclusion<\/h2>\n<p>When trying to run an efficient IT organization, having remote access to certain computer systems might be essential. Unfortunately, when not implemented correctly, the tools that make remote access possible also open your systems up to unwanted guests. In the last few years there have been far too many examples of where vulnerable RDP access gave way to a full-scale network compromise.<\/p>\n<p>In this article we have shown that RDP access can be hardened with some easy steps. Please take the time to review your RDP security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or&#8230;<\/p>\n","protected":false},"author":1071,"featured_media":94495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526],"coauthors":[5766,5403,5784],"class_list":["post-95655","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-advanced-threat-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>RDP Security Explained | McAfee Blog<\/title>\n<meta name=\"description\" content=\"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RDP Security Explained | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-24T16:50:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T07:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1555\" \/>\n\t<meta property=\"og:image:height\" content=\"1037\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Darren Fitzpatrick, John Fokker, Eamonn Ryan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mrdarrenm\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Darren Fitzpatrick, John Fokker, Eamonn Ryan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\"},\"author\":{\"name\":\"Darren Fitzpatrick\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8c70c4811151301ce88a704bada6c7c4\"},\"headline\":\"RDP Security Explained\",\"datePublished\":\"2019-06-24T16:50:08+00:00\",\"dateModified\":\"2024-02-27T07:10:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\"},\"wordCount\":2264,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"keywords\":[\"Advanced Threat Research\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\",\"name\":\"RDP Security Explained | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"datePublished\":\"2019-06-24T16:50:08+00:00\",\"dateModified\":\"2024-02-27T07:10:49+00:00\",\"description\":\"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"width\":1555,\"height\":1037},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"RDP Security Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8c70c4811151301ce88a704bada6c7c4\",\"name\":\"Darren Fitzpatrick\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/292d7886ed69bcc0ad9a7f255536bcc7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bfa7d1a895f7897cdfef3f57e9de96b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bfa7d1a895f7897cdfef3f57e9de96b5?s=96&d=mm&r=g\",\"caption\":\"Darren Fitzpatrick\"},\"description\":\"Darren is a Security Researcher on the McAfee Advanced Threat Research (ATR) team. With a focus on red teaming and with a particular interest in Active Directory attacks, Darren is passionate about breaking networked things to help make defensive blue teams stronger. Having transitioned to ATR from McAfee product engineering, red team work also feeds directly into enhancing our products. Prior to McAfee, Darren spent eight years working in various penetration testing and security consultancy roles. In aid of the Irish security community, Darren helped with leadership of the Dublin OWASP chapter, before initiating the Cork chapter in 2014. Darren holds two security-related MSc's, one taught and one by research, from Dublin City University (DCU), Ireland, along with various industry qualifications.\",\"sameAs\":[\"https:\/\/x.com\/mrdarrenm\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/darren-fitzpatrick\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RDP Security Explained | McAfee Blog","description":"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"RDP Security Explained | McAfee Blog","og_description":"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-06-24T16:50:08+00:00","article_modified_time":"2024-02-27T07:10:49+00:00","og_image":[{"width":1555,"height":1037,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","type":"image\/jpeg"}],"author":"Darren Fitzpatrick, John Fokker, Eamonn Ryan","twitter_card":"summary_large_image","twitter_creator":"@mrdarrenm","twitter_site":"@McAfee","twitter_misc":{"Written by":"Darren Fitzpatrick, John Fokker, Eamonn Ryan","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/"},"author":{"name":"Darren Fitzpatrick","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8c70c4811151301ce88a704bada6c7c4"},"headline":"RDP Security Explained","datePublished":"2019-06-24T16:50:08+00:00","dateModified":"2024-02-27T07:10:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/"},"wordCount":2264,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","keywords":["Advanced Threat Research"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/","name":"RDP Security Explained | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","datePublished":"2019-06-24T16:50:08+00:00","dateModified":"2024-02-27T07:10:49+00:00","description":"RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or \u201cBluekeep.\u201d The blog","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","width":1555,"height":1037},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rdp-security-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"RDP Security Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8c70c4811151301ce88a704bada6c7c4","name":"Darren Fitzpatrick","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/292d7886ed69bcc0ad9a7f255536bcc7","url":"https:\/\/secure.gravatar.com\/avatar\/bfa7d1a895f7897cdfef3f57e9de96b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfa7d1a895f7897cdfef3f57e9de96b5?s=96&d=mm&r=g","caption":"Darren Fitzpatrick"},"description":"Darren is a Security Researcher on the McAfee Advanced Threat Research (ATR) team. With a focus on red teaming and with a particular interest in Active Directory attacks, Darren is passionate about breaking networked things to help make defensive blue teams stronger. Having transitioned to ATR from McAfee product engineering, red team work also feeds directly into enhancing our products. Prior to McAfee, Darren spent eight years working in various penetration testing and security consultancy roles. In aid of the Irish security community, Darren helped with leadership of the Dublin OWASP chapter, before initiating the Cork chapter in 2014. Darren holds two security-related MSc's, one taught and one by research, from Dublin City University (DCU), Ireland, along with various industry qualifications.","sameAs":["https:\/\/x.com\/mrdarrenm"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/darren-fitzpatrick\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1071"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95655"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95655\/revisions"}],"predecessor-version":[{"id":184270,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95655\/revisions\/184270"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94495"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95655"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}