{"id":3690,"date":"2021-09-18T04:03:00","date_gmt":"2021-09-18T04:03:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3690"},"modified":"2026-01-25T07:57:31","modified_gmt":"2026-01-25T07:57:31","slug":"rdp-exposed-literally","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally","title":{"rendered":"RDP Exposed (&#8230;Literally)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">RDP Basics<\/h2>\n\n\n\n<p>For RDP-newbies, read on for the absolute basics. (Otherwise, see Microsoft\u2019s&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-rdpbcgr\/5073f4ed-1e93-45e1-b039-6e30c385867c\" target=\"_blank\" rel=\"noreferrer noopener\">documentation<\/a>&nbsp;for a detailed breakdown on how the connection works.)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is It?<\/h3>\n\n\n\n<p>As the name suggests, Microsoft\u2019s built-in Remote Desktop Protocol (RDP) allows for remote access over a network connection from one computer to another.<\/p>\n\n\n\n<p>It works by opening a dedicated channel on the default RDP listening port (3389) over which data packets \u2013 including keystrokes, mouse movement, and desktop display \u2013 are sent, via Transmission Control Protocol and Internet Protocol (TCP\/IP).<\/p>\n\n\n\n<p>With a successful RDP connection, comes full access to the remote device, including its files, network, and servers; and this access grants the user complete remote control. Handy! &#8230;or dangerous? We\u2019ll get to that.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">History<\/h3>\n\n\n\n<p>It\u2019s been around since the mid-90s, created by software company&nbsp;<a href=\"https:\/\/www.citrix.com\/en-nz\/\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a>&nbsp;and eventually introduced in 1998 as \u2018Terminal Services\u2019 in&nbsp;<a href=\"https:\/\/news.microsoft.com\/1998\/06\/16\/microsoft-releases-windows-nt-server-4-0-terminal-server-edition\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows NT 4.0 Terminal Server Edition<\/a>, with the purpose of giving non-Windows and terminal users the ease of use and benefits of Windows; previously unavailable Windows-based applications could be displayed and interacted with on remote clients following execution on a server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Common Use Cases<\/h3>\n\n\n\n<p>Its original goal of providing powerful capabilities to less capable computers still stands today, however common use-cases have expanded to include:<\/p>\n\n\n\n<p>\u2022 System administrators providing all manner of assistance and maintenance to less tech-savvy staff from the comfort of their ergonomic desk chairs.<\/p>\n\n\n\n<p>\u2022 Employees accessing corporate devices remotely while away from the office, be that due to traveling or \u2013 the more likely scenario in light of the ongoing pandemic \u2013 Working From Home (WFH).<\/p>\n\n\n\n<p>The second scenario has become the more prominent use for RDP, with forced WFH leading to the normalization of teleworking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Dangers<\/h2>\n\n\n\n<p>There\u2019s no arguing that RDP is pretty handy at the very least, and remarkably powerful at best. But as a wise man (a.k.a. Uncle Ben from Spiderman) once said: \u201cWith great power comes great responsibility.\u201d<\/p>\n\n\n\n<p>In other words, if you\u2019re allowing employees to remotely access company devices via RDP, you\u2019re going to have to put a lot more thought into the cyber security measures in place within your organization.<\/p>\n\n\n\n<p>The reason being, RDP is the&nbsp;<a href=\"https:\/\/www.darktrace.com\/en\/blog\/remote-desktop-protocol-rdp-attack-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">single most common attack vector used by cyber criminals<\/a>&nbsp;to gain access to the target system, prior to launching the attack; a fact that\u2019s particularly true for ransomware actors.<\/p>\n\n\n\n<p>Why is it such a popular choice of vehicle?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">It\u2019s an Attractive Target<\/h3>\n\n\n\n<p>Prior to the \u2018big reveal\u2019 (i.e., the moment a successful attacker lets you know that they\u2019ve encrypted all your files and now own your soul), stealth is number one on the cyber criminal\u2019s priority list.<\/p>\n\n\n\n<p>The longer they can remain undetected on the target system, the more they can accomplish \u2013 and unfortunately, the worse it\u2019s going to be for you.<\/p>\n\n\n\n<p>RDP provides native access to another device: allowing attackers to \u2018live off the land\u2019. In other words, they can utilize anything built into that device\u2019s OS (e.g., PowerShell, Command Prompt, Registry Editor, etc.) to accomplish their goal\/s on the target system.<\/p>\n\n\n\n<p>Ease of use also comes into play here. RDP provides the remote user (i.e., the hacker) an exceptionally easy method by which to navigate a computer: a user interface, eliminating the need to work through tools such as PowerShell to perform malicious actions.<\/p>\n\n\n\n<p>It&#8217;s for these reasons that RDP is a hacker\u2019s best friend: it provides the ability to remain undercover, move around the remote device with the utmost ease, and establish a very secure foothold from which to launch the attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">It has Known Security Issues &amp; Vulnerabilities<\/h3>\n\n\n\n<p>Although RDP is built-in to the Windows operating system, its default settings are far from safe and are notoriously arduous to configure securely. Several vulnerabilities also exist that allow for its exploitation on unpatched Windows systems \u2013 the most severe of these known as \u2018BlueKeep\u2019 (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2019-0708\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-0708<\/a>).<\/p>\n\n\n\n<p>The wormable (i.e., self-replicating) remote code execution vulnerability allows the attacker to execute arbitrary code on the target system after sending a specially constructed request to Remote Desktop Services (RDS) via RDP \u2013 without the need for authentication.<\/p>\n\n\n\n<p>No user interaction is required to exploit this vulnerability; if you\u2019re got unpatched Windows systems with RDP enabled, you\u2019re ripe for the exploiting in the eyes of cyber criminals looking for an easy ride.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">It\u2019s Very Accessible<\/h3>\n\n\n\n<p>The most prominent reason attributed to RDP\u2019s popularity as an attack vector is how readily available it is.<\/p>\n\n\n\n<p>When enabled, RDP listens by default on TCP port 3389, accepting packets based on its configuration and other security measures in place. An exposed port is one that accepts packets from the internet.<\/p>\n\n\n\n<p>The COVID-19 pandemic saw a\u00a0<a href=\"https:\/\/reposify.com\/blog\/127-increase-in-exposed-rdps-due-to-surge-in-remote-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">huge jump in exposed RDP ports<\/a>\u00a0in the first three months of 2020 and the numbers have continued to climb over the past year and half. A simple search on\u00a0Shodan\u00a0at around 6pm last night revealed 4,833,6671 exposed default RDP ports, up from 3.5 million in January 2020. By this morning, that number had increased by 31,393.<\/p>\n\n\n\n<p>Yes, you read that right: more than thirty thousand RDP ports we\u2019re opened around the world, listening on TCP port 3389 \u2013 exposed to the internet \u2013 overnight.<\/p>\n\n\n\n<p>By the time you\u2019ve read this, I\u2019d put money on that number having jumped another few hundred thousand. Heck, at the rate we\u2019re going, it might have cracked the 5 million mark! (Not a feat to be celebrated\u2026).<\/p>\n\n\n\n<p>Leaving your ports exposed to the net can be equated to handing a cyber criminal one of your corporate PCs and inviting them to have a crack at getting into it. Sure, it\u2019s password protected, lockout enabled etc., but the thought of an ill-intentioned hacker being that up close and personal \u2013 within a hair\u2019s breadth of your files, network, and servers \u2013 is enough to make any executive cringe.<\/p>\n\n\n\n<p>But that\u2019s essentially the same threat posed by RDP: anyone can scan for port 3389, see what IP addresses they hit, and go for it, which explains why it\u2019s such a desirable and widely used attack vector.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">It\u2019s Dangerously Cheap<\/h3>\n\n\n\n<p>RDP\u2019s accessibility is furthered by dedicated websites that exist solely for the purpose of selling valid RDP credentials \u2013 for as little as $3 USD (how\u2019s that for cheap and nasty!). The already easy job of gaining a foothold via RDP becomes even easier, with the steppingstone of brute forcing credentials now removed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Access &amp; Attack Overview<\/h2>\n\n\n\n<p>In order to use RDP as the attack vehicle, bad actors first need to authenticate to establish the remote connection (unless they\u2019ve exploited a pre-authentication CVE, such as BlueKeep). This requires valid credentials.<\/p>\n\n\n\n<p>Gaining credentials is often achieved through brute force, in which hackers try common account usernames with common passwords. Although, with the increasing implementation of account-lockout policies, there\u2019s been a trend towards attackers trying a small number of the most common passwords with a large number of common, or even known, account IDs to&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=tEmAl3JKWaY\" target=\"_blank\" rel=\"noreferrer noopener\">circumvent instant lock out<\/a>&nbsp;from the target device.<\/p>\n\n\n\n<p>Once access is gained, lateral movement is often attempted: the technique in which a cyber criminal moves from the initial foothold device to another, to another, and so on \u2013 looking for any account that has administrator rights.<\/p>\n\n\n\n<p>A common tactic enlisted by hackers is the installation of keylogging software so that when an administrator logs in, their credentials can be stolen and used to gain access to the higher-level account.<\/p>\n\n\n\n<p>As with all malware attacks (or at least, the sophisticated ones) privilege escalation is the goal once access is gained, as it gives the attacker the ability to propagate \/ terminate \/ exfiltrate \/ encrypto\u2026nate (you get the idea) unchecked. Attacks initiated through RDP are no different.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security in Equal Measure<\/h2>\n\n\n\n<p>When it comes to RDP, there are two key points to consider:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The attack vector itself: RDP<\/li>\n\n\n\n<li>What the attack vector allows.<\/li>\n<\/ol>\n\n\n\n<p>Let\u2019s look at the first point. There are a number of simple (ish) steps that can be taken to reduce risk and lessen the likelihood of RDP being used as an attack vector in your organization:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep software systems updated to eliminate exploitable vulnerabilities.<\/li>\n\n\n\n<li>Implement a password policy that enforces the regular changing of long, complex, original passwords.<\/li>\n\n\n\n<li>Enable Account Lock-out to prevent brute force attacks.<\/li>\n\n\n\n<li>Use Multi-Factor Authentication (MFA) to combat successful brute force attacks.<\/li>\n\n\n\n<li>Use a Virtual Private Network (VPN) to avoid RDP exposure to the internet.<\/li>\n\n\n\n<li>Change the default listening port so that your IP is less likely to be picked up and targeted on the internet.<\/li>\n\n\n\n<li>Limit Access using a firewall to only allow access from specific IP addresses.<\/li>\n\n\n\n<li>Don\u2019t use RDP at all. Disable it. Simple as that. (Or not, judging by the climbing number of exposed ports\u2026)<\/li>\n<\/ul>\n\n\n\n<p>There are various other techniques that could be enlisted in efforts to make RDP more secure but, as mentioned, it\u2019s a burdensome task \u2013 and only handles one half of the equation.<\/p>\n\n\n\n<p>As for the other half: what does the attack vector, RDP, allow? What abilities does it provide to the hacker?<\/p>\n\n\n\n<p>The answer to this question is dependent entirely on the level of privileged access the compromised account has: if the account has admin rights, so does the attacker \u2013 and their job has just become a whole lot easier.<\/p>\n\n\n\n<p>So, in order to crack down on the abilities an attacker has if they gain access through RDP, you need to secure privileged access \u2013 a task made easy through the use of Privileged Access Management (PAM) software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PAM vs. RDP<\/h2>\n\n\n\n<p>PAM software is based on the Principle of Least Privilege (POLP); removing elevated privileges reduces what a user can do on their endpoint and subsequently, what an attacker can do on that endpoint.<\/p>\n\n\n\n<p>It\u2019s important to remember that RDP is just the attack vector: the vehicle used to gain the initial foothold in the target system. Once that foothold is established, an attacker then needs to find the ideal position from which to launch the attack.<\/p>\n\n\n\n<p>PAM software can inhibit the attacker from ever finding that launch position by preventing any activity on the system that requires privileges higher than that of a standard user.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Admin By Request<\/h2>\n\n\n\n<p>Admin By Request is a PAM solution that can, in one fell swoop, revoke all administrative privileges and demote accounts to the level of standard user.<\/p>\n\n\n\n<p>Its key features make it ideal for legitimate users:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users are still able to perform tasks that require administrative privileges by self-initiating administrator sessions as necessary.<\/li>\n\n\n\n<li>IT administrators are still able to remotely assist users through the Support Assist feature.<\/li>\n<\/ul>\n\n\n\n<p>But a nightmare for cyber criminals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A legitimate email address, phone number, and reason needs to be provided in order to request and gain elevated privileges.<\/li>\n\n\n\n<li>An IT administrator must approve the request for elevated privileges before it can be initiated on the endpoint.<\/li>\n\n\n\n<li>All approved administrator sessions are fully audited and available to IT administrators both during and after the session.<\/li>\n\n\n\n<li>Alerting controls and malware scanning tools are in place to flag any untoward activity, such as attempts at privilege escalation.<\/li>\n<\/ul>\n\n\n\n<p>Managing and monitoring elevated access in this way means there is complete accountability: privileged access occurs only upon approval, when absolutely necessary, with a valid reason required \u2013 and it\u2019s all logged.<\/p>\n\n\n\n<p>It means that even if a cyber criminal is able to gain that initial foothold through RDP, they\u2019re still no closer to the end goal; there\u2019s only so much living-off-the-land a hacker can do in a system with absolutely no way to escalate privileges without instant detection.<\/p>\n\n\n\n<p>On the other hand, if you\u2019re now convinced to do away with RDP entirely \u2013 great! Admin By Request offers an easy solution for that too:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Picture1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Blacklist the Remote Desktop Connection application, and kiss goodbye to the vulnerabilities that come with RDP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>There are two parts to the RDP attack vector issue: the easy access it provides to cyber criminals, and the abilities they can gain from that access. If you can\u2019t do without RDP in your organization, you need to consider and prepare for both parts of the equation in order to ensure your network is protected.<\/p>\n\n\n\n<p><a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noreferrer noopener\">Try Admin By Request<\/a>&nbsp;yourself and get those exposed endpoints locked down.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.<\/p>\n","protected":false},"author":2,"featured_media":3691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,131,134,90,129,106,82,79,85,86,84],"ppma_author":[9],"class_list":["post-3690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-antivirus","tag-attack","tag-cyber-criminal","tag-cyberattack","tag-features","tag-malware","tag-ransomware","tag-rdp","tag-remote-desktop-protocol","tag-virus","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,antivirus,attack,cyber criminal,cyberattack,features,malware,ransomware,rdp,remote desktop protocol,virus\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"RDP Exposed (\u2026Literally) \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-09-18T04:03:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:57:31+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"RDP Exposed (\u2026Literally) \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#blogposting\",\"name\":\"RDP Exposed (\\u2026Literally) \\u00bb Admin By Request\",\"headline\":\"RDP Exposed (&#8230;Literally)\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/20.png\",\"width\":2000,\"height\":1315,\"caption\":\"Digital artwork of orange strands of code and lines coming out of a centre point.\"},\"datePublished\":\"2021-09-18T04:03:00+00:00\",\"dateModified\":\"2026-01-25T07:57:31+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#webpage\"},\"articleSection\":\"Blogs, Antimalware, Antivirus, Attack, Cyber Criminal, Cyberattack, Features, Malware, Ransomware, RDP, Remote Desktop Protocol, Virus, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#listItem\",\"name\":\"RDP Exposed (&#8230;Literally)\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#listItem\",\"position\":3,\"name\":\"RDP Exposed (&#8230;Literally)\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally\",\"name\":\"RDP Exposed (\\u2026Literally) \\u00bb Admin By Request\",\"description\":\"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\\u2019t do without it, here\\u2019s a few tips on what you can do to keep your systems safe while using RDP.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/20.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally\\\/#mainImage\",\"width\":2000,\"height\":1315,\"caption\":\"Digital artwork of orange strands of code and lines coming out of a centre point.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/rdp-exposed-literally#mainImage\"},\"datePublished\":\"2021-09-18T04:03:00+00:00\",\"dateModified\":\"2026-01-25T07:57:31+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>RDP Exposed (\u2026Literally) \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"RDP Exposed (\u2026Literally) \u00bb Admin By Request","description":"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,antivirus,attack,cyber criminal,cyberattack,features,malware,ransomware,rdp,remote desktop protocol,virus","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#blogposting","name":"RDP Exposed (\u2026Literally) \u00bb Admin By Request","headline":"RDP Exposed (&#8230;Literally)","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/20.png","width":2000,"height":1315,"caption":"Digital artwork of orange strands of code and lines coming out of a centre point."},"datePublished":"2021-09-18T04:03:00+00:00","dateModified":"2026-01-25T07:57:31+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#webpage"},"articleSection":"Blogs, Antimalware, Antivirus, Attack, Cyber Criminal, Cyberattack, Features, Malware, Ransomware, RDP, Remote Desktop Protocol, Virus, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#listItem","name":"RDP Exposed (&#8230;Literally)"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#listItem","position":3,"name":"RDP Exposed (&#8230;Literally)","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally","name":"RDP Exposed (\u2026Literally) \u00bb Admin By Request","description":"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/20.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally\/#mainImage","width":2000,"height":1315,"caption":"Digital artwork of orange strands of code and lines coming out of a centre point."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally#mainImage"},"datePublished":"2021-09-18T04:03:00+00:00","dateModified":"2026-01-25T07:57:31+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"RDP Exposed (\u2026Literally) \u00bb Admin By Request","og:description":"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2021-09-18T04:03:00+00:00","article:modified_time":"2026-01-25T07:57:31+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"RDP Exposed (\u2026Literally) \u00bb Admin By Request","twitter:description":"Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can\u2019t do without it, here\u2019s a few tips on what you can do to keep your systems safe while using RDP.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3690","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":[],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:04:16","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-05-22 21:57:47","updated":"2026-01-25 08:04:16"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tRDP Exposed (\u2026Literally)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"RDP Exposed (&#8230;Literally)","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/rdp-exposed-literally"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3690"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3690\/revisions"}],"predecessor-version":[{"id":18126,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3690\/revisions\/18126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/3691"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3690"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}