Skip To Main Content 2026 Ransomware Resilience Benchmark Report
Get the Report

Ransomware attacks have become a pervasive and costly threat to organizations worldwide. Among the various attack vectors leveraged by cybercriminals, one stands out: Remote Desktop Protocol (RDP). This blog will delve into why RDP is targeted, the extent of the problem, and what organizations should do to mitigate these risks.

Why RDP is Targeted For Ransomware Deployment

  1. Widely Used: RDP is a legitimate and widely used technology for remotely accessing and managing Windows systems. Many organizations use it to enable remote work, provide technical support, and manage servers. Its ubiquity makes it an attractive target for attackers because it provides a direct pathway into a network.
  2. Weak or Default Credentials: Attackers often find RDP servers with weak or default credentials. This can be due to poor password management, failure to change default passwords, or the use of easily guessable passwords. Attackers use tools that automate brute-force attacks to guess passwords and gain access to RDP services.
  3. Credential Theft: Attackers may obtain RDP credentials through various means, such as phishing, keyloggers, or credential dumping attacks. Once they have valid credentials, they can easily access systems and deploy ransomware.
  4. Vulnerabilities and Exploits: Vulnerabilities in RDP implementations can be exploited to gain unauthorized access to systems. Attackers can exploit these vulnerabilities to execute code remotely, which allows them to compromise systems without the need for valid credentials.
  5. Lateral Movement: Once inside a network through an RDP compromise, attackers can move laterally to other systems and escalate privileges, making it easier to deploy ransomware across a broader range of systems.
  6. Lack of Monitoring and Logging: In some cases, organizations may not have robust monitoring and logging in place for RDP sessions. This makes it difficult to detect and respond to unauthorized access until it’s too late.

Extent of the Problem:

The extent of the RDP-based ransomware problem has been significant, with numerous reported cases of ransomware attacks leveraging RDP as an initial entry point. This issue is not confined to a particular region; it affects organizations on a global scale.

For instance, in the United States, the City of Atlanta experienced a ransomware attack that disrupted critical city services. Attackers exploited RDP as one of the attack vectors, highlighting the vulnerabilities associated with its use. Additionally, LabCorp, a major medical testing company, fell victim to a similar ransomware attack, emphasizing the widespread impact of RDP-based attacks on various industries.

In Europe, cases like the University of Glasgow in Scotland and the Dussmann Group in Germany underscore the transatlantic nature of this threat. These organizations faced ransomware attacks that originated from RDP compromises, illustrating that the problem spans international borders.

The problem is particularly acute for small to medium-sized businesses (SMBs) and public sector entities, as demonstrated by incidents like the Redcar and Cleveland Borough Council in the United Kingdom. Such organizations may have limited cybersecurity resources and may not have implemented robust security practices, making them attractive targets for ransomware operators.

The global prevalence of RDP-based ransomware attacks necessitates proactive measures to mitigate this threat effectively. Organizations, regardless of their size or location, must take concrete steps to secure their RDP access points and fortify their overall cybersecurity defenses.

What Organizations Should Do:

To mitigate the risk of RDP-based ransomware attacks, organizations should take several steps:

  1. Disable Unnecessary RDP: Disable RDP on systems where it’s not needed. If RDP is required, limit its use to only trusted IPs or networks.
  2. Strong Authentication: Enforce strong password policies and consider multi-factor authentication (MFA) for RDP access on every server login.
  3. Regular Patching: Keep RDP software and the underlying operating system up to date with security patches to mitigate vulnerabilities.
  4. Network Segmentation: Isolate critical systems from less critical ones to limit lateral movement in case of an RDP compromise.
  5. Monitor and Log RDP Sessions: Implement comprehensive monitoring and logging of RDP sessions to detect and respond to suspicious activities.
  6. Access Control: Restrict RDP access to only authorized personnel, and regularly review and revoke unnecessary access.
  7. Regular Backups: Maintain secure and up-to-date backups of critical data to minimize the impact of a ransomware attack.
  8. Employee Training: Educate employees about phishing and social engineering attacks to prevent credential theft.
  9. Endpoint Security: Deploy endpoint security solutions to detect and prevent malware and unauthorized access.
  10. Incident Response Plan: Develop and regularly test an incident response plan to respond effectively if an attack occurs.

By taking these measures, organizations can significantly reduce the risk of RDP-based ransomware attacks and improve their overall cybersecurity posture. It’s essential to stay vigilant and adapt security practices as the threat landscape evolves.

To learn how BullWall Server Intrusion Protection can help safeguard your RDP sessions, please visit here, or request a demo.

RECENT BLOGS

Why Ransomware Backups Alone Do Not Deliver Resilience

BullWall Black Background

Ransomware backups are not a resilience strategy. When ransomware strikes, leadership teams instinctively turn to one capability to restore operations: backups. Backups are essential to...

Read More

The Breach That Stalled the Engine

BullWall Blue & Black Background with Logos

The Jaguar Ransomware Attack Proves Encryption Is the Killer (Not Data Theft). When news broke of the Jaguar Land Rover (JLR) ransomware attack in September...

Read More

The Cyber Assessment Framework

BlogBG-BlkOrange

Why CAF 4.0 Demands a Ransomware-First Mindset — and How BullWall Delivers It The CAF 4.0 Challenge for Executives CAF 4.0 isn’t just another compliance...

Read More

CIS18 Ransomware Compliance

BlogBG-BlkOrange

Augmenting CIS18 Ransomware Compliance with BullWall: Strengthening Ransomware Defence Through Automated Containment In today’s cyber landscape, defending against ransomware isn’t just a best practice, it’s...

Read More

DORA Ransomware Compliance

BlogBG-BlkOrange

How BullWall Helps Financial Institutions Strengthen DORA Ransomware Compliance As cyberattacks on financial services continue to rise in scale and sophistication, the European Union’s Digital...

Read More

GDPR Ransomware Compliance

BlogBG-BlkOrange

How BullWall Supports GDPR Ransomware Compliance and Resilience Against Ransomware Under the General Data Protection Regulation (GDPR), organizations are held to a high standard when...

Read More

HIPAA Ransomware Compliance

BlogBG-BlkOrange

HIPAA Ransomware Compliance and the Critical Role of BullWall in Healthcare Cyber Resilience In healthcare, cybersecurity is no longer just an IT issue; it's a...

Read More

NIST Ransomware Compliance

BlogBG-BlkOrange

Bridging the NIST Gap: How BullWall Strengthens Cyber Resilience for Regulated Organizations As organizations across government, defence, healthcare, and other regulated sectors face mounting pressure...

Read More

SOX Ransomware Compliance

BlogBG-BlkOrange

Ransomware and SOX: Why Cybersecurity Is Now a Financial Compliance Issue The Sarbanes-Oxley Act (SOX) was enacted to improve financial transparency and protect investors from...

Read More