Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
Investigators See Ongoing Use of Living-Off-the-Land Binaries, Frequent RDP Abuse
Incident responders studying last year's top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.
Incident responders studying last year's top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.