{"id":23057,"date":"2022-05-20T10:26:42","date_gmt":"2022-05-20T14:26:42","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=23057"},"modified":"2022-05-25T14:57:22","modified_gmt":"2022-05-25T18:57:22","slug":"hackers-target-rdp-servers-to-gain-initial-access-to-corporate-networks","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/hackers-target-rdp-servers-to-gain-initial-access-to-corporate-networks\/","title":{"rendered":"Hackers Target RDP Servers To Gain Initial Access To Corporate Networks"},"content":{"rendered":"<p id=\"arIndex_1\" data-ar-index=\"1\">Researchers have noticed an increase in vulnerabilities used in infiltrating organizations. According to cybersecurity firm Group-IB, the threat actors target remote desktop (RDP) servers that are exposed on the web for initial access into a network.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"2\">Group-IB explained that in 2021, ransomware gangs began to focus on several vulnerabilities in public-facing applications, and quickly moved to add exploits for newly uncovered security issues.<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"3\">Vulnerabilities commonly used by ransomware attackers include CVE-2021-20016 (SonicWall SMA100 SSL VPN), CVE-2021-26084 (Atlassian Confluence), CVE-2021-26855 (Microsoft Exchange), CVE-2021-27101 (Accellion FTA), CVE-2021-27102 (Accellion FTA), CVE-2021-27103 (Accellion FTA), and CVE-2021-27104 (Accellion FTA).<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"4\">Others include CVE-2021-30116 (Kaseya VSA), CVE-2021-34473 (Microsoft Exchange), CVE-2021-34523 (Microsoft Exchange), CVE-2021-31207 (Microsoft Exchange), and CVE-2021-35211 (SolarWinds).<\/p>\n<p id=\"arIndex_5\" data-ar-index=\"5\">A joint report by Cyber Security Works, Securin, Cyware and Ivanti showed that the number of bugs related to ransomware attacks rose to 310 in the first quarter of 2022.<\/p>\n<p id=\"arIndex_6\" data-ar-index=\"6\">Group-IB cites the leaks of the threat actors and claims that ransomware gangs have released information from 3,500 victims, most of whom are based in the U.S. (1,655).<\/p>\n<p id=\"arIndex_7\" data-ar-index=\"7\">Ransomware gangs with the most aggressive operations in 2021 were LockBit (670) and Conti (640), while Pysa came third with data from 186 victims published on their leak sites.<\/p>\n<p id=\"arIndex_8\" data-ar-index=\"8\">The sources for this piece include an article in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gangs-rely-more-on-weaponizing-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have noticed an increase in vulnerabilities used in infiltrating organizations. According to cybersecurity firm Group-IB, the threat actors target remote desktop (RDP) servers that are exposed on the web for initial access into a network. Group-IB explained that in 2021, ransomware gangs began to focus on several vulnerabilities in public-facing applications, and quickly moved [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,57,17,16],"tags":[388,393],"class_list":["post-23057","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-companies","category-data-analytics","category-security","tag-privacy-security","tag-security-strategies"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=23057"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23057\/revisions"}],"predecessor-version":[{"id":23059,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23057\/revisions\/23059"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=23057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=23057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=23057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}