You are not logged in.

Announcement

Welcome to Darknet City forum. One of the most relibable and trusted forum since 2017.

Please read our rulles before place any orders.

Telegram : https://t.me/darknetCity8

Jabber :  Darknetcity@njs.netlab.cz

                                                            mysign                                                         

Since 2017.

mysign

#1 2019-05-21 23:27:52

DUDE420
Member
Registered: 2019-04-21
Posts: 156
Deposit: $0

RDP information

Deep & Dark Web markets selling remote desktop protocol (RDP) access to hacked servers or tools that scan for and brute-force these instances continue to thrive for a number of reasons, not the least of which is the money, time and effort RDP access spares a criminal entity from having to develop more complex attacks.

RDP is a Microsoft protocol and client interface supported on a number of platforms beyond Windows, where it’s been a native feature since XP. It is most often used for legitimate remote administration, but criminals can also use it to remotely access targeted machines for a number of malicious purposes including credential harvesting, account takeover, spam delivery, and as of late, cryptocurrency mining.

Scanning and brute-forcing tools automate attempts to gain access by looking for exposed RDP instances and then trying every possible password combination; poorly configured RDP instances are no match for these tools.

They continue to gain interest on dark web markets—mainly R-speaking markets—as does software that scrubs logs clean for attackers wishing to hide their tracks once a campaign is terminated. Knock-off versions of some popular tools proliferate as well once the original developers decide to no longer support their tools.

RDP access to servers is a powerful tool for a malicious actor. In addition to account takeover and spam delivery, attackers may use illicit RDP access to protect their identities from law enforcement and security researchers.

Illegal activity such as carding and fraud, can be carried out from a compromised computer, leading investigators down the wrong path in trying to determine who may be behind a campaign. RDP access can also be less expensive for a threat actor than using anonymizing technology including some that are commercially available that could be leveraged for activities such as carding. Attackers can also use RDP access to drop destructive malware such as ransomware at scale on a number of machines under their control, or more benignly, install cryptocurrency mining malware on machines. For example, some markets have begun advertising mining botnets that come with RDP scanners and lists of IP addresses to be targeted in brute-forcing attacks.

The clear trend toward automation is gaining steam. Software that scans for exposed RDP connections on standard and non-standard ports is getting better as well, with some tracking system information such as location, and software is for sale allowing hackers to maintain access via RDP when new broadcast IP addresses are assigned to hacked servers.

RDP security has improved on Windows in recent iterations of the operating system; admins may now specify permissions and signify which accounts are able to access systems over RDP, or deny remote access to systems unless network authentication is used. Nonetheless, attackers can still find success using automated tools or, in a few cases, the Shodan search engine to find systems connected to the internet configured for RDP access. Using a brute-force password tool, attackers may obtain access and carry out operations on the newly compromised system.

With direct access to a machine via RDP, attackers are spared the need to buy or develop malware and exploits, or put together and execute phishing campaigns, just to name two things. This direct line to compromised machines is coveted, and something that Flashpoint analysts believe will continue to be an area of interest and investment for threat actors with clear trends toward the automation of target detection and brute forcing.

The most infamous RDP-specific market, xDedic, was exposed in 2016, shining a bright light on this type of activity and unveiling its scope and the types of targets involved. Attackers could purchase access to a hacked server or its contents for fewer than $10 USD, and at one point, xDedic had access to more than 70,000 servers for sale. Hacked servers from more than 170 countries in most industries were available on xDedic in 2016; that market acted as a platform for sellers and buyers to convene and access to these servers could enable any manner of data theft and fraud.

Despite heightened security measures, breaching networks and servers via RDP remains a major source of interest for the cybercriminal underground, with clear trends toward the automation of target detection and brute forcing. The best countermeasure is to deploy complicated passwords in front of an RDP instance, and avoid relying on known default or weak credentials.

Flashpoint assesses with high confidence that cybercriminals will likely continue to use such automated technology to obtain illicit RDP access, breach servers, and remove traces of their activity. Additionally, Flashpoint assesses with moderate confidence that the burgeoning potential for use of RDP access tools in cryptomining campaigns may further increase their popularity among cybercriminals.

Added later 02 min 23 s:
What is Remote Desktop Protocol?
Designed for remote access and management, RDP is a Microsoft method for simplifying application data transfer between client users, devices, virtual desktops, and a Remote Desktop Protocol terminal server.

Simply put, RDP lets you control your computer remotely to manage your resources and access data. This feature is important for small businesses that don’t use cloud computing and rely on their computers or servers installed on premises.

This is not the first time RDP has presented security issues. In the past, early versions had vulnerabilities which made them susceptible to a man-in-the-middle attack giving attackers unauthorized access.

Between 2002 and 2017 Microsoft issued updates which fixed 24 major vulnerabilities related to Remote Desktop Protocol. The new version is more secure, but the FBI announcement points out hackers are still using it as a vector for attacks.

Last edited by DUDE420 (2019-05-21 23:30:48)

Offline

#2 2019-05-24 01:52:59

Moneyman80
New Member
From: Us
Registered: 2019-05-22
Posts: 9
Deposit: $0

Re: RDP information

Great info bro

Offline

#3 2019-05-24 03:04:03

DUDE420
Member
Registered: 2019-04-21
Posts: 156
Deposit: $0

Re: RDP information

thank you brodie

Moneyman80 wrote:

Great info bro

Offline

#4 2019-05-24 07:35:52

sibaxt
Member
Registered: 2019-05-17
Posts: 10
Deposit: $0

Re: RDP information

thanks a lot !

Offline

#5 2019-05-26 00:00:10

Incog1
New Member
Registered: 2019-05-04
Posts: 3
Deposit: $0

Re: RDP information

With xdedic going down....where is the next best vendor for RDPs?   Has anyone else filled the void?

Offline

#6 2019-05-26 12:36:55

sigaieu
Warning! I am SCAMMER
From: Brazil
Registered: 2017-11-27
Posts: 0
Deposit: scammer

Re: RDP information

For RDP needs you can contact me. My customers are satisfied despite the cost.

Incog1 wrote:

With xdedic going down....where is the next best vendor for RDPs?   Has anyone else filled the void?


I am fucking scammer smile

Offline

#7 2019-09-28 21:07:34

alien_life
New Member
Registered: 2019-03-30
Posts: 7
Deposit: $0

Re: RDP information

Just dont buy one of those good old shadow crew VIP VPN services hahaha, NordVPN is more than enough hahha, if there IPz were not common knowledge you could safley card from just a NordVPN account. Global players dont have time to extridite super rich, lawyered up computer scientitis livning in Panama


thoughts, reflections, concerns?


Earth is just the lab of life

Offline

#8 2021-03-01 13:48:30

fadey
Member
Registered: 2019-03-30
Posts: 11
Deposit: $0

Re: RDP information

alien_life wrote:

Just dont buy one of those good old shadow crew VIP VPN services hahaha, NordVPN is more than enough hahha, if there IPz were not common knowledge you could safley card from just a NordVPN account. Global players dont have time to extridite super rich, lawyered up computer scientitis livning in Panama


thoughts, reflections, concerns?

you wrote some shit. hahaha

Offline

#9 2022-05-24 15:40:11

hectorss
Member
Registered: 2022-02-06
Posts: 6
Deposit: $0

Re: RDP information

Thanks for information

Offline

Registered users online in this topic: 0, guests: 1

Board footer