August 17, 2017 By Mark Samuels 2 min read

Millions of ports are being left open online, and many of these are being exposed to potential attackers through the remote desktop protocol (RDP).

An internetwide scan by researchers at Rapid7 discovered that there were more than 11 million devices with open 3389/TCP endpoints. More than 4.1 million of these open ports were using the protocol to communicate in one form or another.

An Ongoing Risk

RDP is a proprietary protocol from Microsoft that gives users the opportunity to access a graphical interface so they can control computers over a network remotely. Support for the protocol has been a feature in almost every version of the Windows operating system (OS) since the introduction of Windows NT.

Its strengths make it a very popular management tool, but it is also a popular focus for cybercriminals. Microsoft has published 20 security updates for the protocol since 2002 and as many as 24 individual vulnerabilities, Rapid7 reported. Newer versions require network level authentication by default, which acts as a boon to security.

However, the protocol is often exposed in internal networks due to its ability to simplify administration and support issues. Its popularity to attackers was demonstrated in June last year when Kaspersky Lab researchers found a cybercriminal trading platform called xDedic that was selling access to more than 70,000 compromised RDP servers.

How Researchers Investigated RDP

Rapid7 researchers were keen to discover which protocols were putting potentially open endpoints at risk. The firm used its Sonar research tool and a series of scans, connections and exchanges to analyze the number of systems that exposed RDP across the internet.

Researchers counted responses that appeared to come from RDP-speaking endpoints, including error messages from possible configuration issues and success messages. Rapid7 suggested that the final tally of 11 million endpoints — with 4.1 million speaking via the protocol — is shockingly high.

Rapid7 said any of the exposed endpoints are not protecting their services through basic firewall rules or access control lists. This revelation highlighted uncertainties as to whether a range of basic security practices are being applied to the endpoints.

What Can IT Managers Do to Respond?

The good news, if there is any, is that Rapid 7 discovered that more than 83 percent of the endpoints were willing to authenticate through the secure CredSSP connection. Researchers suggested that it was impressive that more than four-fifths of exposed endpoints were using one of the more secure protocols to authenticate sessions.

However, the human factor is still a big concern, reported Bleeping Computer. The publication said that these endpoints are often left exposed because administrators rely on credentials that are easy to guess or allow access without authentication. Many of the ports are not protected by a firewall and would be cannon fodder for a malware outbreak.

News of the potential exposure will come as a concern to IT managers at enterprises, where admins often use the protocol to deal with support concerns remotely. The key to success or failure will be how users deploy the protocol to connect. IT managers should use a combination of passwords, firewalls and access control lists to help reduce risk.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today