Tag
Remote Desktop File Opened from Suspicious Path
2 rules 2 TTPsAdversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.
Oracle VirtualBox Unauthenticated RDP Denial-of-Service Vulnerability (CVE-2026-35245)
2 rules 1 TTP 1 CVEAn unauthenticated attacker with network access via RDP can exploit CVE-2026-35245 in Oracle VM VirtualBox version 7.2.6 to cause a denial-of-service (DOS) condition.
Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS
2 rules 5 TTPsAn anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.
Suspicious RDP File Execution
2 rules 2 TTPsThis rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.
Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)
2 rules 2 TTPs 1 CVECVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.
FreeRDP Heap-Buffer-Overflow Vulnerability (CVE-2026-33982)
2 rules 3 TTPs 1 CVE 1 IOCA heap-buffer-overflow read vulnerability exists in FreeRDP versions prior to 3.24.2, specifically in the winpr_aligned_offset_recalloc() function, potentially leading to denial of service or information disclosure.
Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution
2 rules 2 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.
Spike in Number of RDP Connections from a Single Source IP
2 rules 2 TTPsA machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.
Unusually High Mean of RDP Session Duration Detected by Machine Learning
3 rules 2 TTPsA machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.
RDP (Remote Desktop Protocol) from the Internet
2 rules 3 TTPs 1 CVEThis rule detects network events indicative of RDP traffic originating from the internet, which poses a significant security risk due to its frequent exploitation as an initial access or backdoor vector.
Windows Remote Desktop Network Bruteforce Attempt
2 rules 1 TTPThis detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.
RDP Enabled via Registry Modification
2 rules 2 TTPsAn adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.
Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall
2 rules 2 TTPsAdversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.