• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

RDP Attacks Decline 89% in Eight Months

You are here: Home / Cyber Security News / RDP Attacks Decline 89% in Eight Months

Detections of RDP password-guessing attacks declined from 123 billion in the first 4 months of the 12 months to 13 billion in the time period May–August, according to new data from ESET.

The security vendor’s Menace Report collection is compiled employing telemetry from its goods. Unusually, it analyzes the risk landscape in excess of 4-thirty day period periods, with this report masking T2 2022: May–August.

It uncovered an 89% decline in total RDP attack detections from T1 to T2 2022, and a 23% fall in special consumers reporting assaults around the period of time.

Most of the attacks recorded had been aimed at targets in Poland, the US and Spain, with Russian IPs accounting for most (31%) detections.

ESET pointed to several motorists at the rear of the drop in RDP compromise tries, which include modifications in operating patterns, which may imply distant connections are staying applied significantly less, and defensive advancements.

“The good reasons for the decline continue to be the exact same as in T1: much less distant work, much better countermeasures executed by security and IT departments, and Russia’s war with Ukraine, which would seem to have impacted parts of the attacking infrastructure,” the report stated.

“Another aspect that could lead to more drops in RDP assaults is the default security in Windows 11 towards brute-drive attacks. On the other hand, its consequences will most likely become obvious only after more businesses have adopted the most recent model of that running procedure.”

RDP is a best-a few original access vector for ransomware, so the information will be greeted with some relief by corporate IT security departments. Nonetheless, it has occur along with a surge in attacks utilizing vulnerability exploits.

A Secureworks report out this week claimed that vulnerability exploitation accounted for 52% of ransomware incidents it investigated about the previous 12 months, generating it the quantity one particular preliminary accessibility vector.

Nevertheless, ESET’s report claimed that password guessing still accounted for the greatest variety of network intrusions (41%) about the previous 4 months, followed by exploitation of Log4j (13%).

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Eternity Group Hackers Offering New LilithBot Malware as a Service to Cybercriminals
Next Post: The Morning After: Our verdict on the Apple Watch Ultra »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
  • Why DNS Security Is Your First Defense Against Cyber Attacks?
  • SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Copyright © 2025 · AllTech.News, All Rights Reserved.