Fact-checked by Grok 2 weeks ago

Remote desktop software

Remote desktop software refers to a class of applications and protocols that enable users to access, view, and control the of a remote computer or device over a , simulating direct physical as if the user were present at the machine. This technology transmits screen displays, keyboard inputs, and mouse movements between the client device and the host, facilitating tasks such as , IT support, and system administration without requiring physical proximity. The origins of remote desktop software trace back to early network protocols in the 1970s, with the protocol (proposed in RFC 97 in 1971) providing basic command-line remote access to machines. By the mid-1980s, graphical remote control emerged with tools like , developed by Meridian Technologies, which allowed DOS-based remote access over modems by maintaining a resident program in memory. Competing products such as from followed soon after, expanding capabilities for file transfer and screen sharing in early personal computing environments. In 1988, by Farallon Computing introduced network-based remote access for Macintosh systems, marking a shift toward multi-platform support. A pivotal advancement occurred in the late 1990s with Microsoft's Remote Desktop Protocol (RDP), first released as part of Terminal Services in the Terminal Server Edition in 1998, enabling multiple users to share a single via a graphical . Around the same time, the open-source Virtual Network Computing (VNC) protocol was developed at the & Research Lab in , , and publicly released in 1998, offering cross-platform without proprietary restrictions. These protocols laid the foundation for modern implementations, with RDP becoming integral to Windows ecosystems and VNC inspiring numerous variants. Key features of remote desktop software include secure encryption for data transmission, (MFA) to prevent unauthorized access, and support for multiple operating systems such as Windows, macOS, , iOS, and . Additional capabilities often encompass between devices, support, session recording for auditing, and high-performance rendering to minimize over or local networks. These features make remote desktop software essential for hybrid work environments, enabling real-time collaboration, remote troubleshooting, and access to resources like applications and files from anywhere with an connection. However, security remains a critical concern, as vulnerabilities in protocols like RDP have been exploited in cyberattacks, underscoring the need for regular updates and robust configurations.

Definition and Overview

Core Concept

Remote desktop software refers to applications or built-in operating system features that allow a to remotely and control the (GUI) of a computer or over a , enabling interaction with the remote system's , applications, and files as if the were physically present at the machine. This capability facilitates seamless operation from distant locations, typically requiring an or local connection to transmit visual data and inputs in . Unlike terminal emulation tools or (SSH) protocols, which limit users to text-based command-line interfaces for executing commands without visual representation of the desktop, remote desktop software replicates the full , including windows, icons, and elements, to support intuitive, point-and-click interactions. This distinction makes remote desktop ideal for tasks demanding visual feedback, such as software or graphical application use, whereas text-based methods suffice for scripting and server administration. The fundamental architecture of remote desktop software follows a client-server model: the client software, installed on the user's local device, captures and forwards inputs like entries and actions to the component on the remote host, which processes these commands, updates the system's accordingly, and streams compressed screen captures back to the client for rendering. This bidirectional communication ensures low- , though depends on network bandwidth and . Remote desktop technology represents an evolution from early text-based remote access systems, such as developed in the 1970s for command-line connectivity over networks, to comprehensive graphical solutions emerging in the . Pioneering tools like in the mid-1980s and in 1988 began shifting toward control via modems, paving the way for broader adoption of visual remote desktops that mirrored local computing experiences.

Historical Development

The origins of remote desktop software trace back to text-based remote access in the 1970s, exemplified by protocols like (RFC 97, 1971) and experiments that enabled command-line interaction with distant mainframes via teletype terminals. These systems laid the groundwork for networked computing but were limited to text interfaces without graphical elements. The 1980s marked significant advancements in remote graphical user interfaces, driven by the growth of local area networks. Developed at MIT's and released in 1984 with support from (DEC), the provided a network-transparent that permitted remote display of graphical applications across Unix-based machines, becoming a cornerstone for environments. This protocol's design emphasized client-server architecture, allowing applications to run on powerful servers while rendering interfaces on resource-limited client devices. In the , remote desktop technology transitioned toward more accessible, proprietary solutions for personal and enterprise use. introduced its Java-based remote access platform in 1997, enabling web browser-mediated control of desktop applications without native client software, which broadened adoption in heterogeneous environments. followed with () in 1998 as part of Terminal Server, providing secure, bitmap-based remote control of full Windows desktops over TCP/IP networks, rapidly gaining traction in business settings. The saw the rise of open-source alternatives and protocol evolutions that democratized remote access. (VNC), developed in 1998 by researchers at Olivetti & Oracle Research Lab (later AT&T Labs Cambridge), offered a cross-platform, pixel-based protocol for screen sharing and remote control, fostering widespread community-driven implementations. Meanwhile, Citrix evolved its Independent Computing Architecture (ICA) protocol, originally from the 1990s, into more scalable versions integrated with , supporting thin-client deployments in large enterprises. From the 2010s onward, remote desktop software integrated deeply with and mobility, adapting to distributed workforces. Amazon launched WorkSpaces in 2013, a managed cloud-based desktop service leveraging RDP and PCoIP protocols to deliver virtual desktops on AWS infrastructure, emphasizing scalability and global accessibility. The in 2020 significantly increased adoption, prompting enhancements in security and multi-device support.

Core Functionality

Operational Mechanism

Remote desktop software functions through a client-server , enabling a at a client device to interact with a remote computer's over a network. The operational process commences with connection initiation, where the client application contacts the server using the target's or via TCP/IP for reliable data transport. follows, typically involving username/ credentials or multi-factor methods to verify the and establish a secure session, preventing unauthorized access. Following session establishment, the continuously captures the display —the pixel-based representation of the screen content—and encodes it for efficient transmission. Compression algorithms reduce the size, minimizing requirements, while techniques like differencing identify and send only incremental changes between frames to optimize performance over varying conditions. The client receives this , decodes it, and renders the remote locally for viewing. Concurrently, the client captures user inputs such as keystrokes and movements, forwarding them to the , which executes them as if performed locally and updates the in response. protocols ensure low-latency interaction by aligning input events with screen updates, creating a responsive despite delays. Session management maintains continuity and adaptability throughout the interaction. In case of temporary disconnections, the software supports seamless reconnections, preserving the session state to resume without restarting applications. support is handled by capturing and transmitting framebuffers from each display independently, allowing the client to render an extended desktop view. Bandwidth adaptation further enhances reliability; for instance, the dynamically adjusts encoding quality or frame rates based on detected , employing differencing to transmit only modified screen regions and reduce data volume during low-bandwidth scenarios. These mechanisms collectively ensure robust, interactive across diverse environments.

Essential Features

Remote desktop software fundamentally enables screen sharing, allowing users to view and interact with a remote computer's as if they were physically present at the machine. This core feature transmits visual updates from the remote system to the client in near real-time, supporting tasks such as , , and . Another essential capability is clipboard synchronization, which permits seamless copying and pasting of text, images, and other between the local and remote environments. This redirection ensures that clipboard contents are mirrored bidirectionally, enhancing by eliminating the need to switch between systems for data transfer. File transfer functionality allows users to or files directly within the remote session, often through integrated drives or dedicated tools that local folders to the remote desktop. This feature supports efficient exchange of documents and resources without requiring separate applications. Audio redirection captures and streams sound from the remote computer to device, enabling users to hear system notifications, media playback, or voice communications during the session. This supports scenarios like remote or applications. Advanced options include multi-session support, which permits multiple users to connect simultaneously to a single host or , facilitating shared access in settings. Printing redirection maps local printers to the remote session, allowing documents printed from the remote desktop to output on the user's physical printer without additional setup. Dynamic resolution adjustment automatically scales the remote to match the client's size or screen dimensions, ensuring optimal viewing without manual reconfiguration. VPN integration embeds capabilities, enabling secure tunneling of remote connections over encrypted channels for added network protection. To optimize performance, remote desktop software employs compression algorithms that reduce data transmission size, particularly effective in low-bandwidth scenarios by prioritizing changes in the screen content. Caching mechanisms, such as persistent caching, store frequently used graphical elements on the to minimize redundant data transfer and accelerate rendering. Hardware acceleration via GPU offloads encoding and rendering tasks to the , improving frame rates and reducing latency for graphics-intensive applications. For accessibility, remote desktop software supports integration with assistive technologies like screen readers, which vocalize remote interface elements to assist users with visual impairments during sessions.

Protocols and Standards

Primary Protocols

The (RDP) is a proprietary binary protocol developed by to enable remote access and control over network connections. It operates through a layered that includes , , and protocols, facilitating efficient transmission of screen updates, keyboard, and mouse inputs. RDP supports multimedia redirection, allowing audio, , printer, and drive sharing between client and server without full pixel streaming. Introduced as version 4.0 in 1998 with the Terminal Server Edition, subsequent iterations have enhanced performance; for instance, versions 8.0 and later integrate H.264/AVC compression for high-quality video remoting with reduced bandwidth. Virtual Network Computing (VNC) relies on the (RFB) protocol, an designed for simple remote access to graphical user interfaces across diverse windowing systems. RFB functions at the level, transmitting data in rectangular regions from server to client, with support for various encodings like raw pixels or compressed formats to optimize for network conditions. This pixel-based approach ensures platform independence but can be bandwidth-intensive without compression. Variants such as extend RFB by incorporating compression for lossy encoding of suitable screen areas, improving efficiency over low-bandwidth links while maintaining compatibility with the core protocol. The RFB specification, documented in RFC 6143, allows extensions for and additional features without altering the base version. The Independent Computing Architecture (ICA) is a proprietary protocol developed by , emphasizing and delivery over remote sessions. ICA uses a multi-stream transport mechanism, separating data flows for graphics, audio, printing, and across multiple connections to prioritize interactive elements and reduce . This supports dynamic allocation and adaptive , focusing on rendering individual applications rather than full desktops, which enhances in virtualized environments. The Simple Protocol for Independent Computing Environments () is an open-source protocol tailored for remote access to s, providing seamless integration of display, audio, and input devices. It employs a client-server model with channels for separate data types, enabling efficient handling of and peripherals in virtualized setups. SPICE is optimized for hypervisors like KVM and , where it leverages paravirtualized drivers such as QXL for accelerated graphics rendering and reduced overhead. Key features include USB redirection, allowing client-side USB devices to be passed through to the guest with minimal .

Protocol Comparisons

Remote desktop protocols differ significantly in performance, particularly in usage and handling, which impacts their suitability for various network conditions and workloads. For instance, Microsoft's RDP employs adaptive and GPU (introduced in 7.1), achieving low consumption of under 1 Mb/s for office tasks and around 3 Mb/s for video playback, while effectively managing through mechanisms. In contrast, VNC (using the RFB protocol) exhibits higher overhead, often exceeding RDP by 2-3 times for dynamic content due to its pixel-based screen capture approach, and struggles with in scenarios, resulting in poorer for video. SPICE, designed for virtualized environments, offers robust handling for USB and audio peripherals but relies on MJPEG encoding, which can increase CPU load and in low- modes compared to RDP's . Citrix's ICA (now evolved into HDX) mirrors RDP's efficiency, maintaining under 1 Mb/s for office applications and scaling to 3 Mb/s for video, with superior handling of high- networks through prioritized data flows.
ProtocolBandwidth (Office Tasks)Bandwidth (Video)Latency Handling
RDP<1 Mb/s~3 Mb/sGood (adaptive)
VNCHigher than RDP (pixel-based)High overheadPoor for dynamic content
Variable (encoding-dependent)MJPEG-dependentStrong for VMs/peripherals
ICA/HDX<1 Mb/s~3 Mb/sExcellent (prioritized flows)
Compatibility across platforms and integrations varies, influencing deployment choices. VNC stands out for universal cross-platform support, operating seamlessly on Windows, Linux, macOS, and mobile devices without proprietary dependencies, making it ideal for ad-hoc access. RDP, while extensible to Linux and macOS via clients, remains Windows-centric and tightly integrated with ecosystems, limiting its native use in heterogeneous environments. excels in virtualization compatibility, particularly with hypervisors like /KVM, providing native support for consoles and peripherals, though it requires specific server setups. ICA/HDX offers strong enterprise compatibility within Citrix infrastructures, supporting Windows and but relying on dedicated brokers for multi-user , which can complicate non-Citrix integrations. Security and extensibility features further delineate protocol strengths. RDP utilizes TLS by default and supports Network Level Authentication, enhancing for remote sessions, with extensibility through multimedia redirection channels. VNC's is more basic, often relying on optional add-ons, though modern implementations include TLS; its allows broad extensibility but exposes risks in unencrypted variants. incorporates dynamic resource access controls and open-source auditing, with TLS support, making it extensible for custom plugins. ICA/HDX provides advanced via AES-256 and load balancing for multi-user environments, with high extensibility for policy-based access in infrastructures. Trade-offs among these protocols balance , , and . RDP's Windows-optimized suits corporate environments but sacrifices broad , whereas VNC's enables quick, cross-platform setups at the cost of higher resource demands and suboptimal multimedia performance. trades some for superior integration, ideal for VM-heavy scenarios despite increased server CPU usage. ICA/HDX offers scalable, low-latency performance for but requires proprietary infrastructure, contrasting VNC's lightweight ad-hoc accessibility. Overall, selection depends on prioritizing thriftiness (favoring RDP/ICA) versus platform agnosticism (favoring VNC/).

Applications and Use Cases

Enterprise Applications

Remote desktop software plays a crucial role in IT administration within , enabling administrators to perform remote , , and server management without requiring physical to devices. This capability allows IT teams to diagnose and resolve issues efficiently, such as configuring settings or updating on distributed servers, thereby minimizing and operational disruptions. For instance, remote facilitates proactive and of networked systems across global locations, ensuring consistent and rapid response to incidents. In enterprise environments, virtual desktop infrastructure (VDI) leverages remote desktop software to deliver centralized virtual desktops, allowing users to securely access corporate resources from any device. VDI hosts desktop environments on centralized servers, providing scalable and persistent access to applications and data while maintaining control over sensitive information. This approach supports secure remote connectivity, often integrating with enterprise authentication systems like Active Directory to enforce user policies and permissions. Remote desktop software facilitates for hybrid teams by enabling seamless access to work environments, which is essential for maintaining in distributed workforces. It supports compliance with regulations by allowing organizations to choose between on-premises and cloud-based VDI deployments, ensuring data remains within jurisdictional boundaries as required by laws in over 100 countries. This flexibility aids in adhering to standards like GDPR and CCPA, reducing legal risks associated with cross-border data transfers. The adoption of remote desktop software in enterprises yields significant cost benefits, including reduced hardware requirements through centralized resource management and improved scalability for large-scale deployments. By minimizing the need for individual workstations and extending the lifespan of existing devices, organizations can lower capital expenditures on physical . Additionally, enhanced IT support efficiency translates to indirect savings by accelerating issue resolution and optimizing resource allocation.

Personal Applications

Remote desktop software enables individuals to access and control their personal computers from other devices in home environments, facilitating seamless integration within household networks for everyday tasks. This capability is particularly valuable for users who need to retrieve documents, manage multimedia content, or interact with high-performance hardware without being physically present at the main device. For instance, tools like allow free personal access to home computers worldwide, supporting file transfers and screen control with minimal setup. In home networking scenarios, remote desktop applications permit users to access personal files stored on a primary PC from laptops, tablets, or secondary devices connected via local networks. This is useful for retrieving documents or backups without relying on , as seen with RemotePC's drag-and-drop features that maintain during sessions. Users can also control media centers, such as streaming setups or home theater PCs, to play videos or music remotely; Personal, for example, provides low-latency access on local networks for such entertainment purposes at no cost. Additionally, gaming enthusiasts leverage remote desktop for accessing powerful rigs from less capable devices, enabling play on laptops or mobiles with high-frame-rate streaming— supports for this, reducing the need for multiple hardware setups. For among friends and family, remote desktop software simplifies by allowing non-experts to grant temporary access without physical visits. Microsoft's , built into Windows, enables one party to view and control another's screen using a six-digit code, ideal for resolving issues like software updates or virus removal in . This approach saves time and travel, as highlighted in guides for cross-platform assistance, where users approve sessions for security; tools like further enhance this by offering easy invitations for informal help sessions. Mobile access extends personal productivity by allowing smartphones and tablets to connect to home or office PCs for on-the-go tasks, such as editing documents or checking emails. The Remote Desktop app for supports full keyboard and mouse input, enabling users to manage desktop applications from portable devices over secure connections. Similarly, facilitates access from or to any enabled computer, promoting flexibility for users away from their primary setup. In educational contexts, remote desktop software supports students in accessing university computers from personal devices, ensuring continuity for coursework involving specialized software. Splashtop's remote solutions allow secure control of on-site machines, enabling participation in classes or experiments without visits. This also aids , as platforms like Getscreen.me enable shared screen sessions for group projects, where students can demonstrate or co-edit work in real-time.

Implementations and Examples

Commercial Solutions

Commercial remote desktop software encompasses proprietary solutions developed by major vendors, offering robust, supported platforms for and individual users seeking seamless remote access, enhanced , and with existing infrastructures. These products dominate the market, with key players including , Citrix, , and , which collectively hold significant shares in a sector projected to grow from approximately $3.9 billion in 2025 to over $11 billion by 2032, driven by demand for hybrid work and cloud-based . Their unique selling points often revolve around , low-latency performance, and ecosystem compatibility, positioning them as leaders in and evaluations for remote access capabilities. Microsoft Remote Desktop, natively integrated into Windows operating systems since , enables users to connect to remote Windows PCs and servers using the (RDP). It supports secure, multi-session access to virtual desktops and applications, with features like dynamic session resizing and clipboard redirection for efficient collaboration. A key strength lies in its deep integration with the ecosystem, including licensing (/E5 plans) and services, allowing organizations to leverage existing subscriptions without additional costs. (AVD), Microsoft's cloud extension, provides a fully managed platform for deploying /10 desktops on infrastructure, offering pay-per-second billing, global scalability across data centers, and compliance with over 100 certifications for enterprise security. This combination positions as a market leader for organizations invested in the cloud, facilitating cost-optimized migrations from on-premises VDI setups. Citrix Virtual Apps and Desktops is an enterprise-grade solution designed for large-scale , emphasizing centralized of virtual machines, applications, and user access through Citrix Studio and Web Studio consoles. It excels in application publishing, where specific apps can be streamed to users without full desktop access, reducing resource demands and enhancing security in high-stakes environments like finance and healthcare. The proprietary Independent Computing Architecture (ICA) underpins its communications, supporting virtual channels for features such as USB redirection, optimization, and secure ICA traffic to mitigate risks. Citrix's focus on and multi-cloud deployments, including with and AWS, makes it ideal for IT administrators seeking granular control over licensing, scalability, and policy enforcement in regulated industries. TeamViewer stands out for its cross-platform compatibility, supporting remote access across Windows, macOS, , , , and even devices, with a straightforward setup process that requires minimal configuration via ID and password sharing. Its unattended access feature allows permanent, password-protected connections for IT support and maintenance without user intervention, complemented by mobile apps for on-the-go control from smartphones or tablets. TeamViewer emphasizes ease of use for remote support scenarios, including , multi-monitor handling, and session recording, making it popular among service desks and small businesses. With over 645,000 paying customers and facilitating more than 1 billion remote connections annually to a vast array of devices, it maintains a strong market position through its reliable infrastructure and AES-256 . AnyDesk differentiates itself through its proprietary DeskRT , which achieves under 16 milliseconds and high frame rates by efficiently compressing image data, ensuring fluid remote sessions even on bandwidth-constrained networks. It employs connections when feasible to minimize server dependency, enhancing speed and reducing costs for direct device-to-device access. This low-latency performance is particularly valued in such as media production and , where high-fidelity visuals for tasks like and are essential, allowing professionals to collaborate remotely without perceptible delays. AnyDesk's lightweight client and cross-platform support further solidify its appeal for creative workflows, positioning it as a nimble alternative in the commercial market for users prioritizing visual quality over extensive enterprise management tools.

Open-Source Solutions

Open-source remote desktop solutions provide accessible, modifiable alternatives to , enabling users to customize and extend functionality through community contributions. These tools emphasize cross-platform and integration with established protocols, making them suitable for diverse environments such as and Windows systems. is an enhanced variant of the VNC protocol, offering remote and over networks. It maintains full with standard VNC implementations while incorporating optimizations for , such as multi-monitor support and scaling, which contribute to its suitability for resource-constrained setups. As a free and open-source application, supports basic encryption through password storage and is available for Windows, with implied for environments, facilitating cross-access between these operating systems. xrdp serves as an open-source RDP server designed for non-Windows operating systems, particularly , allowing native RDP clients to connect and access graphical sessions. It provides a secure graphical , with default TLS for transport, and supports features like two-way transfer, audio redirection, and mounting to enhance . This focus on protocol compatibility enables seamless integration with clients such as Remote Desktop and FreeRDP across Windows, macOS, , and platforms. Apache Guacamole functions as a clientless remote desktop gateway, accessible directly through web browsers without requiring dedicated client installations. Licensed under the 2.0, it integrates multiple protocols including VNC, RDP, and SSH, allowing centralized management of remote connections from HTML5-enabled devices. This browser-based approach promotes accessibility and customization via extensible APIs, making it ideal for environments needing protocol-agnostic remote access.

Security Considerations

Security Mechanisms

Remote desktop software incorporates various authentication methods to verify user identity and prevent unauthorized access. Multi-factor authentication (MFA) is a standard feature, requiring users to provide two or more verification factors, such as a password combined with a one-time code from an authenticator app or email. For instance, in Remote Desktop Services (RDS), MFA can be enforced through integration with Microsoft Entra ID, ensuring all users and administrators authenticate securely before establishing a session. Certificate-based authentication uses digital certificates issued by a trusted certificate authority to authenticate clients and servers, replacing or supplementing password-based methods. In RDS, certificates secure connections by signing communications and verifying server identity during the initial handshake, with support for templates like Remote Desktop Authentication for automated issuance. Biometric integration, such as fingerprint or facial recognition via Windows Hello for Business, allows users to authenticate remotely using local device biometrics, which are securely forwarded to the remote session without exposing raw data. This method works with RDP connections but requires compatible hardware and policies on both client and host. Encryption standards protect during remote sessions, employing robust protocols to maintain and . typically relies on (TLS) or Secure Sockets Layer (SSL), with modern implementations supporting TLS 1.2 or higher for and data protection. In RDP, enhanced security mode outsources to TLS, using 128-bit or stronger keys (e.g., AES-256) to encrypt all session traffic after authentication, while session occurs via the client's random value encrypted with the server's public key during the security exchange PDU. Similarly, VNC Connect applies AES-GCM 128-bit or 256-bit with perfect forward secrecy, ensuring that compromised session keys do not affect past or future communications. Access controls limit what authenticated users can do within remote sessions, enforcing granular permissions to minimize risks. (RBAC) assigns permissions based on user roles, such as read-only access for support staff or full administrative rights for IT admins, as implemented in through Microsoft Entra roles. IP whitelisting restricts connections to approved IP addresses or ranges, preventing access from untrusted networks; this is configurable via firewalls or gateway settings in and other solutions. Session timeouts automatically disconnect idle or prolonged sessions to reduce exposure, with RDP supporting configurable idle timeouts through (e.g., 15-60 minutes) to enforce least-privilege principles. Auditing mechanisms track and remote access activities to detect and respond to potential threats. Comprehensive records connection details, including user identity, source , timestamps, and session duration, stored in system event logs such as Windows and Terminal Services logs for RDP (e.g., Event ID 4624 for successful logons). builds on these logs by analyzing patterns for deviations, such as unusual login times or geolocations, often integrated with tools like Azure for real-time alerts on unauthorized attempts in environments.

Vulnerabilities and Risks

Remote desktop software is susceptible to through or weak credentials, which facilitate brute-force attacks where attackers systematically attempt password guesses to gain unauthorized access. Such risks are amplified when users reuse simple passwords across accounts, making RDP servers prime targets for automated credential-stuffing attempts. For instance, the 2019 vulnerability (CVE-2019-0708) in Microsoft's allowed remote code execution on unpatched Windows systems without , highlighting how configurations in legacy setups exacerbate these threats. Man-in-the-middle (MITM) attacks pose another significant risk, particularly when sessions are unencrypted or rely on flawed mechanisms, enabling attackers to intercept and alter communications between client and server. In RDP, the Credential Security Support Provider (CredSSP) protocol has been vulnerable to such attacks, as seen in CVE-2018-0886, where improper validation allowed after initial authentication, potentially exposing credentials and session data. This flaw affects RDP implementations across Windows versions, permitting attackers to impersonate servers and relay malicious payloads during unpatched connections. Zero-day exploits targeting protocol handling further compromise remote desktop systems, often through buffer overflows that enable arbitrary code execution before patches are available. A notable example is the 2020 exploitation of CVE-2019-19781 in Citrix ADC and Gateway appliances, a zero-day vulnerability allowing unauthenticated remote code execution via path traversal in the protocol stack, which impacted numerous enterprise deployments before mitigation. More recently, as of May 2025, Microsoft patched two critical remote code execution vulnerabilities in Remote Desktop Services (e.g., CVE-2025-30397), which could allow unauthorized attackers to execute code over a network via heap-based buffer overflows. Similarly, in November 2024, UltraVNC revision 1211 was found to contain multiple critical off-by-one vulnerabilities in its VNC server code, potentially leading to remote code execution (CVSS 9.8). Denial-of-service (DoS) attacks exploit resource exhaustion on default connection ports like 3389 for RDP, overwhelming servers with flood traffic or malformed requests to disrupt availability. Such attacks can cause memory leaks through repeated invalid RDP connections, leading to system crashes or service unavailability without requiring . Additionally, amplification techniques abusing /3389 in RDP configurations enable distributed DoS campaigns, where small queries trigger large responses to exhaust bandwidth and CPU resources on targeted hosts.

Malicious Uses

Remote Access Trojans

Remote Access Trojans (RATs) are a category of that disguise themselves as legitimate software to deceive users, while embedding backdoors that enable attackers to gain persistent, unauthorized over infected systems. These tools mimic the functionality of legitimate remote desktop software by providing interactive access, allowing attackers to execute commands, monitor activities, and manipulate the victim's machine as if physically present. Prominent examples include , developed in 2008 and used broadly since 2011, which offers attackers capabilities such as to capture over 210 million recorded inputs across thousands of victims, screen capture for monitoring, and access for surveillance on more than 13,000 infected machines. Another widely used RAT is , also known as Bladabindi and emerging in late 2012, which supports remote desktop control, capture, , and spying to facilitate unauthorized surveillance and data theft. RATs typically infect systems through phishing emails containing malicious attachments that exploit vulnerabilities in documents like files, requiring user interaction to execute, or via drive-by downloads from compromised websites that deliver payloads without direct user action. Once installed, they establish command-and-control () communication by opening hidden network ports, often using encrypted connections on non-standard ports, to receive instructions from the attacker's and exfiltrate data such as files or system information. In addition to core remote control features, RATs extend to advanced malicious functions, including and access for live spying, keylogging for theft, and in some variants, integration of mining modules that hijack system resources to generate illicit profits without user consent. For instance, enables file and command execution through interfaces resembling remote desktop tools, allowing attackers to browse and transfer sensitive data covertly. These capabilities make RATs particularly dangerous for persistent threats, as they maintain stealthy access for extended periods.

Notable Malicious Incidents

In May 2021, the DarkSide ransomware group targeted , the largest fuel pipeline operator in the U.S., using a compromised legacy VPN account for initial network access and subsequently leveraging (RDP) for persistence and lateral movement within the IT systems. The attack forced the company to shut down operations for several days, causing fuel shortages and across the East Coast, with economic impacts estimated in the billions; Colonial paid a $4.4 million , of which $2.3 million was later recovered by the FBI. DarkSide's tactics, including RDP , underscored the vulnerability of to . The 2023 MOVEit supply chain attack involved the ransomware group exploiting a zero-day vulnerability (CVE-2023-34362) in Progress Software's Transfer application, followed by deployment of a and use of RDP to interact with and exfiltrate data from compromised systems. This campaign affected thousands of organizations worldwide, including government agencies, leading to the theft of over 60 million records and extortion demands; notable victims included , the , and U.S. Department of Energy affiliates, with ongoing data leaks into 2024.

References

  1. [1]
    What is a Remote Desktop? - RealVNC®
    A remote desktop allows you to access and control a computer or network from a different location, providing the same interface as if you were physically there.Missing: definition | Show results with:definition
  2. [2]
    What is Remote Desktop and Why is It Important? - LogMeIn
    Remote desktop allows a user to virtually control a computer from a remote location, accessing all resources as if they were physically there.
  3. [3]
    Remote Desktop Guide: Setup, Features & Security - Splashtop
    Oct 21, 2025 · Remote desktop allows users to access and control a computer from a different location using a network connection, enabling remote work and IT ...
  4. [4]
  5. [5]
    Remote Desktop Access History: Pretty Cool, Until a Hacker Does It
    Feb 12, 2021 · First offered in the mid-1980s, the software, initially produced by Meridian Technologies, used a trick to stay resident in memory in DOS, ...
  6. [6]
    What is Remote Desktop Protocol (RDP)? - StrongDM
    Remote Desktop Protocol (RDP) is a Microsoft protocol allowing users to remotely access and control a Windows system using a GUI.<|control11|><|separator|>
  7. [7]
    The 7 most important remote access software considerations
    1. Security considerations · 2. Remote audio · 3. Consider what platforms you need to support · 4. Good remote desktop performance · 5. Cloud and direct connections.
  8. [8]
    Best Remote Desktop Software Guide 2025 - OpenEDR
    Oct 7, 2025 · Key Features of Remote Desktop Software · 1. Cross-Platform Access. Support for Windows, macOS, Linux, iOS, and Android. · 2. Multi-Factor ...
  9. [9]
    RemotePC™ - Remote Access Features
    Access remote desktops 24/7 to work and collaborate from anywhere in real time with file transfer, multi-monitor support, chat, and session recording ...
  10. [10]
    What is a Remote Desktop and How Does It Work? - TechTarget
    Apr 10, 2025 · A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and ...
  11. [11]
    What is a Remote PC and How Does it Work? | Windows 365
    A remote PC is a computer that you can connect to from somewhere else and control as if you were there in person. It's also called a remote desktop.
  12. [12]
    Comparing Remote Access Protocols: RDP vs SSH - HelpWire
    Rating 5.0 (49) Apr 28, 2025 · A difference between Remote Desktop and SSH is the ability to furnish users with a graphical interface. There are times when it is absolutely ...
  13. [13]
    VNC vs SSH: Choosing the Best Remote Access Solution for Your ...
    SSH offers a lightweight and encrypted option for command-line administration, while VNC delivers a full graphical desktop experience for interactions with GUI- ...
  14. [14]
    What Is Remote Desktop Protocol (RDP)? - Heimdal Security
    Jun 7, 2025 · How does RDP work? RDP uses a client-server architecture, with the client initiating the connection and the server responding to the request.How Does Rdp Work? · Microsoft Rdp Limitations · Rdp Security Best Practices
  15. [15]
    An In-Depth Guide to Remote Desktop Protocol (RDP) - CovertSwarm
    Oct 1, 2024 · How does RDP work? RDP works through a client-server architecture. The RDP server is installed on the computer that must be accessed remotely, ...
  16. [16]
    How Does Remote Desktop Work? Complete Guide - ScreenConnect
    Sep 20, 2024 · A remote desktop allows users to access another computer over a network. The user connects, the server transmits data, and the user interacts ...
  17. [17]
    Understanding Remote Desktop Protocol (RDP) - Windows Server
    Jan 15, 2025 · This article describes the Remote Desktop Protocol (RDP) that's used for communication between the Terminal Server and the Terminal Server Client.Missing: operational | Show results with:operational
  18. [18]
    How does VNC technology work? - RealVNC Help Center
    Jul 17, 2023 · VNC uses the RFB protocol to transmit screen data. The server captures the desktop, sends it to the viewer, and the viewer sends input back for ...
  19. [19]
    Windows Desktop Sharing - Microsoft Learn
    May 30, 2018 · Windows Desktop Sharing provides remote desktop connection software that allows screen sharing or desktop sharing.
  20. [20]
    Configure clipboard redirection over the Remote Desktop Protocol
    Jun 20, 2025 · You can configure the redirection behavior of the clipboard between a local device and a remote session over the Remote Desktop Protocol (RDP).Missing: screen audio
  21. [21]
    Use features of the Remote Desktop Web client - Azure Virtual ...
    Apr 13, 2025 · The Remote Desktop Web client features include display preferences, grid/list view, light/dark mode, file transfer, clipboard, and printer ...
  22. [22]
    How to Transfer Files Using a Remote Desktop App - RealVNC®
    In this post, we'll show you how to use remote desktop file transfers with RealVNC Connect to get more work done from anywhere.
  23. [23]
    Configure audio and video redirection over the Remote Desktop ...
    Jun 20, 2025 · This article provides information about the supported redirection methods and how to configure the redirection behavior for audio and video peripherals.Missing: screen clipboard synchronization,
  24. [24]
    Windows Enterprise multi-session FAQ - Azure | Microsoft Learn
    This article answers frequently asked questions and explains best practices for Windows 10 Enterprise multi-session and Windows 11 Enterprise multi-session.
  25. [25]
    Configure printer redirection over the Remote Desktop Protocol
    Sep 6, 2025 · Configuration of a Cloud PC governs the ability to redirect printers from a local device to a remote session, and is set using Microsoft Intune ...
  26. [26]
    Resolution and Scaling Level Updates in RDP 8.1
    Sep 7, 2018 · In this blog, I discuss the improvements made to dynamically update the resolution and scaling level from the local system to the remote session.Missing: adjustment | Show results with:adjustment
  27. [27]
    TeamViewer VPN
    Nov 8, 2024 · TeamViewer has a built-in VPN service that allows you to connect to a device to share files and printers.
  28. [28]
    Remote Desktop Protocol (RDP) bandwidth requirements
    Jun 20, 2025 · RDP detects that and adjusts image quality, frame rate, or compression algorithms if other applications request the network.Missing: hardware acceleration
  29. [29]
    [MS-RDPBCGR]: Persistent Bitmap Caches - Microsoft Learn
    Apr 7, 2025 · A Persistent Bitmap Cache is a store that contains bitmap images that were sent to the client by using the Cache Bitmap (Revision 2) Secondary Drawing Order.
  30. [30]
    Graphics encoding over the Remote Desktop Protocol
    Hardware-accelerated encoding: offloads the processing of graphics encoding from the CPU to the GPU on a remote virtual machine equipped with a capabable GPU.
  31. [31]
    What's new in the Remote Desktop client for Windows
    Here's the version history and release notes. Select a tab for the platform you're using. Remote Desktop client (MSI); Remote Desktop app. The following list ...Azure Virtual Desktop · Microsoft Ignite · CVE-2025-27487<|separator|>
  32. [32]
    [MS-RDPBCGR]: Remote Desktop Protocol: Basic Connectivity and ...
    Sep 3, 2022 · Specifies the Remote Desktop Protocol: Basic Connectivity and Graphics Remoting, designed to facilitate user interaction with a remote computer system.Published Version · Previous Versions · Preview Versions
  33. [33]
    What is RDP? Remote Desktop Protocol Explained - Apporto
    RDP (Remote Desktop Protocol) by Microsoft enables users to control remote computers for administrative tasks and support.
  34. [34]
    RFC 6143 - The Remote Framebuffer Protocol - IETF Datatracker
    RFB ("remote framebuffer") is a simple protocol for remote access to graphical user interfaces that allows a client to view and control a window system on ...
  35. [35]
    Citrix ICA® virtual channels | Citrix Virtual Apps and Desktops™ 7 ...
    Virtual channels are a necessary part of the remote computing experience with the Citrix Virtual Apps and Desktops servers.
  36. [36]
    Architecture | Citrix Virtual Channel SDK for Citrix Workspace app for ...
    Sep 19, 2023 · A Citrix Independent Computing Architecture (ICA) virtual channel is a bidirectional, error-free connection for the exchange of generalized ...
  37. [37]
    Spice User Manual
    **Summary of SPICE Protocol from Spice User Manual**
  38. [38]
  39. [39]
  40. [40]
    Enterprise buyer's guide: Remote IT support software - Computerworld
    Aug 19, 2024 · Remote IT support software, also called PC remote control tools or remote desktop software, lets support professionals access a wide variety of remote devices.Remote It Support Software... · Beyondtrust Remote Support · Solarwinds Dameware Remote...<|control11|><|separator|>
  41. [41]
    Remote desktop software: 8 enterprise-friendly IT support tools
    May 20, 2020 · Enterprise features include user management, remote reboot, file transfer, compliance support, computer grouping, and remote deployment (which ...
  42. [42]
    What is VDI (Virtual Desktop Infrastructure)? - Amazon AWS
    VDI technology creates a virtual desktop on a central server, and remote users can access this desktop from a physical machine over the internet. VDI can ...What is VDI (Virtual Desktop... · What is virtual desktop... · How does desktop...
  43. [43]
    What is Virtual Desktop Infrastructure (VDI)? - Microsoft Azure
    An example of VDI is Azure Virtual Desktop, a cloud-based service for organizations that provides remote desktop and application experiences to employees ...
  44. [44]
    Connect to remote Microsoft Entra joined device
    Aug 18, 2025 · Windows supports remote connections to devices joined to Active Directory s well as devices joined to Microsoft Entra ID using Remote Desktop Protocol (RDP).
  45. [45]
    Managing GDPR and CCPA Compliance for a Remote Workforce
    Jun 17, 2025 · With remote work on the rise, IT teams need to maintain compliance with data privacy regulations such as GDPR and CCPA.
  46. [46]
  47. [47]
    Virtual desktop infrastructure and data sovereignty: why are they ...
    Feb 10, 2022 · By storing Virtual Desktop Infrastructure data in one country, organisations can ensure compliance and avoid legal risks. In addition ...
  48. [48]
    Business benefits of Remote Desktop Services - Sherweb
    Nov 2, 2022 · Giving users the ability to access and work on a remote machine has multiple business benefits such as reduced costs, improved efficiencies and ...
  49. [49]
    Top Benefits of Using Remote Desktop Services (RDS)
    Sep 1, 2025 · By adopting RDS, companies can drastically reduce their hardware costs and extend the lifespan of their existing devices. With RDS, businesses ...
  50. [50]
    Top Benefits of Remote Computer Access for Businesses & Individuals
    Rating 5.0 (88) Dec 11, 2024 · 1. Improved Productivity · 2. Cost Savings · 3. Improved IT Support and Maintenance Efficiency · 4. Enhanced Data Security Measures · 5. Business ...<|control11|><|separator|>
  51. [51]
    Free remote PC software: Connect anywhere - TeamViewer
    Access any computer worldwide with TeamViewer—secure, fast, and completely free for personal use. One-click connection, no tech skills needed ...
  52. [52]
    The Best Remote Access Software We've Tested for 2025 - PCMag
    What's the Best Free Remote Access Software? TeamViewer is our top pick for free remote access software because it offers free use for personal purposes.Table of Contents · What's the Best Free Remote... · Is Remote Access Software...
  53. [53]
    Splashtop Personal: Remote Access Desktop Software
    4.8 177 · Free deliveryRemotely Access Your Computer from Any Device. Use Splashtop Personal for free* on the local network to access your home computer from the comfort of your couch ...Subscription Options · Splashtop Remote Access · Splashtop Personal Features
  54. [54]
    Remote Desktop Software for Gaming - Splashtop
    Oct 2, 2025 · Unlock high-end remote desktop gaming on any device with Splashtop. Enjoy seamless, secure & vibrant 4K streaming without needing advanced ...
  55. [55]
    Solve PC problems remotely using Quick Assist - Microsoft Support
    Use the Quick Assist app to get help with a computer problem from family or friends or help them out. Quick Assist uses a remote connection.
  56. [56]
    Home Tech Support: How to Remotely Troubleshoot Your Relative's Computer
    ### Summary of Use Cases for Remote Technical Support Using Remote Desktop Software
  57. [57]
    Best Remote Access Program to Help Friends & Family - Splashtop
    Oct 29, 2025 · Discover how Splashtop provides secure, easy-to-use remote access solutions perfect for helping family with tech needs from anywhere.
  58. [58]
    Connect to Remote Desktop Services and remote PCs on Android
    Jul 3, 2024 · In the Connection Center, tap +, and then tap Desktop. · Enter the name of the remote PC into PC name. · Select the User name you use to access ...
  59. [59]
    Chrome Remote Desktop
    Securely access your computer whenever you're away, using your phone, tablet, or another computer. Connect with another computer to collaborate or give remote ...Android - Google Chrome Help · Access my computer · Remote Support · Sign in
  60. [60]
    How to Remotely Access a PC From Your iPhone or Android Device
    Go to Settings > System > Remote Desktop and turn on Enable Remote Desktop. By default, Keep your PC awake for connections when it is plugged in and Make my PC ...
  61. [61]
    Remote Computer Lab Access for Students & Teachers - Splashtop
    Splashtop remote desktop software lets students remotely access and take control of on-site computers from their own devices.
  62. [62]
    Intuitive Remote Desktop Software for Educational Use - Getscreen.me
    Guide students by demonstrating on their computers. Use screen sharing on a whiteboard or collaborate on a single device, remotely access school computers.
  63. [63]
    A high-level guide to converting campus labs to remote desktops
    Jul 27, 2020 · RDP provides colleges and universities with the ability to make existing campus lab computers and devices instantly accessible to both students ...Rdp As A Solution For Higher... · The Benefits Of Rdp In... · Impact On Student ExperienceMissing: collaboration | Show results with:collaboration<|separator|>
  64. [64]
    Remote Desktop Software Market Size, Share | Report [2032]
    The global remote desktop software market size was valued at $3.33 billion in 2024 & is projected to grow from $3.92 billion in 2025 to $11.98 billion by ...Missing: commercial positions
  65. [65]
    Azure Virtual Desktop | Microsoft Azure
    Azure Virtual Desktop combines the scale, security, and cost benefits of Azure and Microsoft 365 for a secure remote desktop from virtually anywhere.Provide Remote Desktops And... · Modernize Your Citrix Or... · Trusted By The World's Most...
  66. [66]
    The hidden cost of digital friction: Why your employees are suffering ...
    The G2 Fall 2025 Reports are out, and TeamViewer has once again been recognized as a leader across multiple categories, industries, and markets worldwide.
  67. [67]
    What is Azure Virtual Desktop? - Azure - Microsoft Learn
    Jun 20, 2025 · Once assigned, users can connect to their published Windows desktops and applications using Windows App or the Remote Desktop client. · Securely ...Host pools · Quickstart: deploy a sample... · PrerequisitesMissing: integration | Show results with:integration
  68. [68]
    Technical overview | Citrix Virtual Apps and Desktops™ 7 2503
    Citrix Virtual Apps and Desktops share a unified architecture called FlexCast Management Architecture (FMA). FMA's key features are the ability to run multiple ...
  69. [69]
    Security considerations and best practices | Citrix Virtual Apps and ...
    Securing ICA® communications. Citrix Virtual Apps and Desktops™ provides several options for securing ICA traffic between the client and the VDA. The ...
  70. [70]
    Secure remote desktop access from anywhere - TeamViewer
    Secure any device, anywhere—Windows, Mac, Linux, mobile—with TeamViewer Remote. Experience industry-leading encryption without VPN hassles. Remote desktop ...
  71. [71]
    Unattended remote access - TeamViewer
    Unattended remote access allows quick, unsupervised access to devices, enabling system admins to make changes to end devices anywhere, with permanent log-on  ...Missing: statistics | Show results with:statistics
  72. [72]
  73. [73]
    High Performance Remote Desktop Software - AnyDesk
    Built by us, DeskRT is an innovative codec that forms the foundation of AnyDesk. It compresses and transfers image data between computers in a way that no ...Why Anydesk Is So Fast · Anydesk's Performance In... · Experience Anydesk's
  74. [74]
    Remote Access Solution for Media Creatives - AnyDesk
    AnyDesk's industry-leading video-codec DeskRT helps you to work seamlessly from afar by reducing latency to a level imperceptible to the human eye.Be Creative From Anywhere · Remote Backup Management And... · Discover More
  75. [75]
    What is AnyDesk? A Comprehensive Guide for MSPs ... - RDS Tools
    Oct 13, 2024 · AnyDesk is a remote desktop software that allows users to access and control computers remotely, facilitating a range of tasks from IT support to collaborative ...Anydesk For Msps · How Anydesk Supports Msps · Comparing Anydesk To...Missing: peer- peer creative
  76. [76]
    Apache Guacamole® - The Apache Software Foundation
    Apache Guacamole is a clientless remote desktop gateway. It supports standard protocols like VNC, RDP, and SSH.Guacamole Manual · Release Archives · 1.6.0 · FAQ
  77. [77]
    xrdp by neutrinolabs
    xrdp provides a graphical login to remote machines using RDP (Microsoft Remote Desktop Protocol). xrdp accepts connections from variety of RDP clients.
  78. [78]
    TightVNC: VNC-Compatible Free Remote Desktop Software
    TightVNC is a free and Open Source remote desktop software that lets you access and control a computer over the network.Download TightVNCServer for WindowsWhat's NewTightVNC LicensingTightVNC Documentation
  79. [79]
    More Freedom to the Desktop - NoMachine
    NoMachine is a free, easy-to-use program for remote Mac & PC access. Log into your computer from anywhere, control your desktop, run your programs & access ...
  80. [80]
    Security recommendations for Azure Virtual Desktop - Microsoft Learn
    Jun 20, 2025 · This article describes steps you can take as an administrator to keep your Azure Virtual Desktop deployments secure.
  81. [81]
    Use certificates in Remote Desktop Services | Microsoft Learn
    Jul 14, 2025 · You can use certificates to secure connections to your Remote Desktop Services (RDS) deployment and between RDS server roles.
  82. [82]
    Remote Desktop sign-in with Windows Hello for Business
    Jan 27, 2025 · Remote Desktop with biometric doesn't work with Dual Enrollment or scenarios where the user provides alternative credentials. System ...
  83. [83]
    Security and privacy | VNC® Connect - RealVNC
    RealVNC Connect uses end-to-end encryption, does not record sessions, has default two-factor authentication, and offers a privacy mode to protect sessions.Missing: mechanisms | Show results with:mechanisms
  84. [84]
    11 Best Practices to Secure Remote Desktop Access
    Oct 27, 2025 · Remote Desktop Access Best Practices · Use Multi-factor Authentication (MFA) · Don't expose RDP directly to the internet · Enable Network Level ...Missing: mechanisms | Show results with:mechanisms
  85. [85]
    What are the security risks of RDP? | RDP vulnerabilities - Cloudflare
    Weak user sign-in credentials.​​ The problem is that the same password is often used for RDP remote logins as well. Companies do not typically manage these ...
  86. [86]
    Why RDPs Are an Easy Mark for Threat Actors - ReliaQuest
    Sep 11, 2024 · Weak and default passwords are easily exploited by brute-force attacks, so to avoid attackers easily gaining unauthorized access to RDP through ...RDP Brute-Force TTPs · Case Study: Russia-Linked... · Forecast
  87. [87]
    Protect against BlueKeep - Microsoft
    Aug 8, 2019 · The BlueKeep vulnerability is “wormable,” meaning it creates the risk of a large-scale outbreak due to its ability to replicate and propagate.
  88. [88]
    Security Risks of Remote Desktop Access and How to Prevent Them
    Weak password protection on the remote connection can make it easy for cybercriminals to break into the session and gain access to everything on a user's ...<|separator|>
  89. [89]
    Critical Vulnerability in CredSSP Allows Remote Execution
    Mar 13, 2018 · This vulnerability consists of a flaw in CredSSP that is used by RDP and WinRM and which takes care of securely forwarding credentials to ...
  90. [90]
    Cyber Actors Increasingly Exploit The Remote Desktop Protocol to ...
    Sep 27, 2018 · Outdated versions of RDP may use flawed CredSSP, the encryption mechanism, thus enabling a potential man-in-the-middle attack. Allowing ...Missing: unencrypted | Show results with:unencrypted
  91. [91]
    Detecting Citrix CVE-2019-19781 - CISA
    May 21, 2020 · CVE-2019-19781 is an arbitrary code execution vulnerability that has been detected in exploits in the wild. An attacker can exploit this ...Missing: zero- | Show results with:zero-
  92. [92]
  93. [93]
    CVE-2001-0540 Detail - NVD
    Memory leak in Terminal servers in Windows NT and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion)
  94. [94]
    Rule Docs 1:1448 - Snort
    Memory leak in Terminal servers in Windows NT and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of ...
  95. [95]
    Reflection/Amplification DDoS Attack Mitigation - NetScout Systems
    Jan 20, 2021 · When enabled on UDP/3389, the Microsoft Windows RDP service may be abused to launch UDP reflection/amplification attacks with an amplification ...
  96. [96]
    Trojan Horse - OWASP Foundation
    Remote Access Trojan (RAT): Designed to provide the attacker full control of the infected machine. Trojan horse usually masqueraded as a utility. Data ...Missing: definition | Show results with:definition
  97. [97]
    [PDF] Dark Matter: Uncovering the DarkComet RAT Ecosystem
    Remote Access Trojans (RATs) are a persistent class of malware that give an attacker direct, interactive access to a victim's personal computer, allowing the ...
  98. [98]
    NJRat - NJCCIC
    NJRat is a remote access trojan (RAT), first spotted in June 2013 with samples dating back to November 2012. It was developed and is supported by Arabic ...
  99. [99]
    [PDF] Identification and Disruption of the Warzone Remote Access Trojan ...
    Feb 15, 2024 · Warzone RAT was primarily distributed as a malicious attachment in an email (T1566), either through broad malware spam (malspam) campaigns or ...Missing: definition | Show results with:definition
  100. [100]
    2021 Top Malware Strains - CISA
    Aug 25, 2022 · In 2021, the top malware strains included remote access Trojans (RATs), banking Trojans, information stealers, and ransomware.
  101. [101]
    Inside the infamous Mirai IoT Botnet: A Retrospective Analysis
    Dec 14, 2017 · This post provides an analysis of Mirai, the Internet-of-Things botnet that took down major websites via massive DDoS using 100s of 1000s of ...
  102. [102]
    DDoS attack that disrupted internet was largest of its kind in history ...
    Oct 26, 2016 · Dyn, the victim of last week's denial of service attack, said it was orchestrated using a weapon called the Mirai botnet as the 'primary ...
  103. [103]
    Capital One Attacker Exploited Misconfigured AWS Databases
    Jun 20, 2022 · The 36-year-old Seattle tech worker behind the infamous 2019 Capital One data breach has been convicted on seven charges related to the data theft.
  104. [104]
    [PDF] Lessons Learned from the Capital One Data Breach - Zscaler
    Jul 1, 2021 · The attacker identified a misconfigured WAF that enabled accessing the corresponding AWS EC2 instance/. ECS task *metadata* using Server-side ...
  105. [105]
    DarkSide Ransomware: Best Practices for Preventing Business ...
    Jul 8, 2021 · After gaining initial access to the pipeline company's network, DarkSide actors deployed DarkSide ransomware against the company's IT network.
  106. [106]
    Colonial Pipeline disconnects OT systems to silo ransomware IT threat
    May 12, 2021 · The attackers were observed using remote desktop protocol (RDP) to maintain persistence inside of systems, according to the joint FBI/CISA alert ...<|separator|>
  107. [107]
    #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023 ...
    Jun 7, 2023 · SUMMARY. Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders ...
  108. [108]
    The MOVEit Vulnerability: What it Means for Your OT Infrastructure
    Aug 14, 2023 · After initial access is gained, CL0P actors have been observed using the Remote Desktop Protocol (RDP) to interact with compromised systems.