Zero-Day RDP Exploit threatens Windows

One of the latest Zero-Day exploits infecting Windows computers is a worm called Morto and it uses the Remote Desktop Protocol (RDP), generating large amounts of outbound RDP traffic on port 3389 (the default port for RDP) and compromising both desktop and server systems, including those that are fully patched. It basically uses a brute force password attack to attempt to log onto the Remote Desktop servers as an administrator. If you aren’t using the Remote Desktop feature, you should turn it off. You can also change the port that it uses, or require remote users to establish a VPN to connect to their internal computers. Complex passphrases will help to protect against the brute force attack. Find out more here:

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top