Article 5D7BJ DDoSers are abusing Microsoft RDP to make attacks more powerful

DDoSers are abusing Microsoft RDP to make attacks more powerful

by
Dan Goodin
from Ars Technica - All content on (#5D7BJ)
ddos-800x480.jpg

Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protection (credit: Getty Images)

DDoS-for-hire services are abusing the Microsoft Remote Desktop Protocol to increase the firepower of distributed denial-of-service attacks that paralyze websites and other online services, a security firm said this week.

Typically abbreviated as RDP, Remote Desktop Protocol is the underpinning for a Microsoft Windows feature that allows one device to log into another device over the Internet. RDP is mostly used by businesses to save employees the cost or hassle of having to be physically present when accessing a computer.

As is typical with many authenticated systems, RDP responds to login requests with a much longer sequence of bits that establish a connection between the two parties. So-called booter/stresser services, which for a fee will bombard Internet addresses with enough data to take them offline, have recently embraced RDP as a means to amplify their attacks, security firm Netscout said.

Read 8 remaining paragraphs | Comments

index?i=cHxcu1uxW9M:ChTO0QdaINg:V_sGLiPB index?i=cHxcu1uxW9M:ChTO0QdaINg:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments