Investigators See Ongoing Use of Living-Off-the-Land Binaries, Frequent RDP Abuse. Incident responders studying last year’s top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.
First seen on govinfosecurity.com
Jump to article: www.govinfosecurity.com/attackers-abuse-remote-desktop-protocol-microsoft-binaries-a-27934