Jmage
Member
- Reaction score
- 0
- Location
- Quebec, Canada
Hi!
I don't know about you guys but this week as been the "RDP Brute Force" week for my clients. Many of them called me about their account being locked. I'm pretty sure it's the nasty Cryptolocker and his friends trying to get access inside my clients network to dump their payload.
So far, no infections. Only locked out accounts. All of them had RDP open on their server and some of them on their work computer too.
I always keep the default 3389 port closed and forward different ports like 3399, 3398 etc... Right now, I have changed the ports for some new ones and the attacks seems to have stoped. I guess only until it find my new port...
What bugs me is that all the servers have the main "administrator" accout disabled and I use another name for the admin account and a "backdoor". The first admin account gets locked but thankfully not my backdoor. How do they find the account name to brute force? I mean, they find the admin account and all my clients usernames. If I unlock a user it would get locked back in less than 1 minute.
Some of them have SBS 2011 with Exchange and OWA. Can it come from there? Should I disable OWA?
Also, what do you guys do to keep your RDP secure and don't get your accounts locked out?
I know about using a VPN but I'm not too much into letting a non-managed computer enter their network...
Thanks in advance for your wisdom.
I don't know about you guys but this week as been the "RDP Brute Force" week for my clients. Many of them called me about their account being locked. I'm pretty sure it's the nasty Cryptolocker and his friends trying to get access inside my clients network to dump their payload.
So far, no infections. Only locked out accounts. All of them had RDP open on their server and some of them on their work computer too.
I always keep the default 3389 port closed and forward different ports like 3399, 3398 etc... Right now, I have changed the ports for some new ones and the attacks seems to have stoped. I guess only until it find my new port...
What bugs me is that all the servers have the main "administrator" accout disabled and I use another name for the admin account and a "backdoor". The first admin account gets locked but thankfully not my backdoor. How do they find the account name to brute force? I mean, they find the admin account and all my clients usernames. If I unlock a user it would get locked back in less than 1 minute.
Some of them have SBS 2011 with Exchange and OWA. Can it come from there? Should I disable OWA?
Also, what do you guys do to keep your RDP secure and don't get your accounts locked out?
I know about using a VPN but I'm not too much into letting a non-managed computer enter their network...
Thanks in advance for your wisdom.