Skip to content

T1021.001 Remote Desktop Protocol

Adversaries may use Valid Accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).1

Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the Accessibility Features or Terminal Services DLL for Persistence.2

Item Value
ID T1021.001
Sub-techniques T1021.001, T1021.002, T1021.003, T1021.004, T1021.005, T1021.006, T1021.007
Tactics TA0008
Platforms Windows
Permissions required Remote Desktop Users, User
Version 1.1
Created 11 February 2020
Last Modified 30 March 2023

Procedure Examples

ID Name Description
G0006 APT1 The APT1 group is known to have used RDP during operations.28
G0022 APT3 APT3 enables the Remote Desktop Protocol for persistence.45 APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.46
G0087 APT39 APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.4748
G0096 APT41 APT41 used RDP for lateral movement.5852
G0001 Axiom Axiom has used RDP during operations.40
G0108 Blue Mockingbird Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.36
C0015 C0015 During C0015, the threat actors used RDP to access specific network hosts of interest.60
C0018 C0018 During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.59
S0030 Carbanak Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.20
G0114 Chimera Chimera has used RDP to access targeted systems.57
G0080 Cobalt Group Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.27
S0154 Cobalt Strike Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.1413
S0334 DarkComet DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.15
G0035 Dragonfly Dragonfly has moved laterally via RDP.31
G0051 FIN10 FIN10 has used RDP to move laterally to systems in the victim environment.26
G0037 FIN6 FIN6 used RDP to move laterally in victim networks.3435
G0046 FIN7 FIN7 has used RDP to move laterally in victim environments.44
G0061 FIN8 FIN8 has used RDP for lateral movement.23
G0117 Fox Kitten Fox Kitten has used RDP to log in and move laterally in the target environment.4243
G1001 HEXANE HEXANE has used remote desktop sessions for lateral movement.33
S0434 Imminent Monitor Imminent Monitor has a module for performing remote desktop access.6
S0283 jRAT jRAT can support RDP control.19
G0094 Kimsuky Kimsuky has used RDP for direct remote point-and-click access.29
S0250 Koadic Koadic can enable remote desktop on the victim’s machine.5
G0032 Lazarus Group Lazarus Group malware SierraCharlie uses RDP for propagation.2524
G0065 Leviathan Leviathan has targeted RDP credentials and used it to move through the victim environment.39
G0059 Magic Hound Magic Hound has used Remote Desktop Services to copy tools on targeted systems.3837
G0045 menuPass menuPass has used RDP connections to move across the victim network.5556
S0385 njRAT njRAT has a module for performing remote desktop access.12
G0049 OilRig OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.545352
G0040 Patchwork Patchwork attempted to use RDP to move laterally.30
S0192 Pupy Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.7
S0583 Pysa Pysa has laterally moved using RDP connections.22
S0262 QuasarRAT QuasarRAT has a module for performing remote desktop access.89
S0379 Revenge RAT Revenge RAT has a plugin to perform RDP access.16
S0461 SDBbot SDBbot has the ability to use RDP to connect to victim’s machines.11
S0382 ServHelper ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.17
G0091 Silence Silence has used RDP for lateral movement.41
C0024 SolarWinds Compromise During the SolarWinds Compromise, APT29 used RDP sessions from public-facing systems to internal servers.61
G0088 TEMP.Veles TEMP.Veles utilized RDP throughout an operation.32
S0670 WarzoneRAT WarzoneRAT has the ability to control an infected PC using RDP.21
G0102 Wizard Spider Wizard Spider has used RDP for lateral movement.495051
S0350 zwShell zwShell has used RDP for lateral movement.18
S0412 ZxShell ZxShell has remote desktop functionality.10

Mitigations

ID Mitigation Description
M1047 Audit Audit the Remote Desktop Users group membership regularly. Remove unnecessary accounts and groups from Remote Desktop Users groups.
M1042 Disable or Remove Feature or Program Disable the RDP service if it is unnecessary.
M1035 Limit Access to Resource Over Network Use remote desktop gateways.
M1032 Multi-factor Authentication Use multi-factor authentication for remote logins.4
M1030 Network Segmentation Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network.
M1028 Operating System Configuration Change GPOs to define shorter timeouts sessions and maximum amount of time any single session can be active. Change GPOs to specify the maximum amount of time that a disconnected session stays active on the RD session host server.3
M1026 Privileged Account Management Consider removing the local Administrators group from the list of groups allowed to log in through RDP.
M1018 User Account Management Limit remote user permissions if remote access is necessary.

Detection

ID Data Source Data Component
DS0028 Logon Session Logon Session Creation
DS0029 Network Traffic Network Connection Creation
DS0009 Process Process Creation

References


  1. Microsoft. (n.d.). Remote Desktop Services. Retrieved June 1, 2016. 

  2. Alperovitch, D. (2014, October 31). Malware-Free Intrusions. Retrieved November 4, 2014. 

  3. Microsoft. (n.d.). Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions. Retrieved December 11, 2017. 

  4. Berkeley Security, University of California. (n.d.). Securing Remote Desktop for System Administrators. Retrieved November 4, 2014. 

  5. Magius, J., et al. (2017, July 19). Koadic. Retrieved June 18, 2018. 

  6. QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020. 

  7. Nicolas Verdier. (n.d.). Retrieved January 29, 2018. 

  8. MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018. 

  9. Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018. 

  10. Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019. 

  11. Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020. 

  12. Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: “njRAT” Uncovered. Retrieved June 4, 2019. 

  13. Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022. 

  14. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017. 

  15. Kujawa, A. (2018, March 27). You dirty RAT! Part 1: DarkComet. Retrieved November 6, 2018. 

  16. Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019. 

  17. Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019. 

  18. McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018. 

  19. Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019. 

  20. Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018. 

  21. Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021. 

  22. CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021. 

  23. Elovitz, S. & Ahl, I. (2016, August 18). Know Your Enemy: New Financially-Motivated & Spear-Phishing Group. Retrieved February 26, 2018. 

  24. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Remote Administration Tools & Content Staging Malware Report. Retrieved March 16, 2016. 

  25. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016. 

  26. FireEye iSIGHT Intelligence. (2017, June 16). FIN10: Anatomy of a Cyber Extortion Operation. Retrieved June 25, 2017. 

  27. Matveeva, V. (2017, August 15). Secrets of Cobalt. Retrieved October 10, 2018. 

  28. FireEye Labs. (2014, May 20). The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ’s Findings on APT1 Intrusion Activity. Retrieved November 4, 2014. 

  29. ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019. 

  30. Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved August 3, 2016. 

  31. US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018. 

  32. Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019. 

  33. SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19  

  34. FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016. 

  35. McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019. 

  36. Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020. 

  37. DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023. 

  38. DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022. 

  39. Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019. 

  40. Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014. 

  41. Group-IB. (2018, September). Silence: Moving Into the Darkside. Retrieved May 5, 2020. 

  42. CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020. 

  43. ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020. 

  44. Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021. 

  45. valsmith. (2012, September 21). More on APTSim. Retrieved September 28, 2017. 

  46. Glyer, C. (2018, April 14). @cglyer Status Update. Retrieved October 11, 2018. 

  47. Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019. 

  48. Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020. 

  49. John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020. 

  50. DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020. 

  51. The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020. 

  52. Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020. 

  53. Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017. 

  54. Unit42. (2016, May 1). Evasive Serpens Unit 42 Playbook Viewer. Retrieved February 6, 2023. 

  55. PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017. 

  56. US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020. 

  57. Cycraft. (2020, April 15). APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors. Retrieved August 24, 2020. 

  58. Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019. 

  59. Costa, F. (2022, May 1). RaaS AvosLocker Incident Response Analysis. Retrieved January 11, 2023. 

  60. DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022. 

  61. CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.