G1030 Agrius

Agrius tunnels RDP traffic through deployed web shells to access victim environments via compromised accounts.[3] Agrius used the Plink tool to tunnel RDP connections for remote access and lateral movement in victim environments.[4]

G0006 APT1

The APT1 group is known to have used RDP during operations.[5]

G0022 APT3

APT3 enables the Remote Desktop Protocol for persistence.[6] APT3 has also interacted with compromised systems to browse and copy files through RDP sessions.[7]

G0087 APT39

APT39 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.[8][9]

G0096 APT41

APT41 used RDP for lateral movement.[10][11] APT41 used NATBypass to expose local RDP ports on compromised systems to the Internet.[12]

G1023 APT5

APT5 has moved laterally throughout victim environments using RDP.[13]

G0143 Aquatic Panda

Aquatic Panda leveraged stolen credentials to move laterally via RDP in victim environments.[14]

G0001 Axiom

Axiom has used RDP during operations.[15]

G0108 Blue Mockingbird

Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.[16]

C0015 C0015

During C0015, the threat actors used RDP to access specific network hosts of interest.[17]

C0018 C0018

During C0018, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.[18]

C0032 C0032

During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.[19]

S0030 Carbanak

Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions.[20]

G0114 Chimera

Chimera has used RDP to access targeted systems.[21]

G0080 Cobalt Group

Cobalt Group has used Remote Desktop Protocol to conduct lateral movement.[22]

S0154 Cobalt Strike

Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.[23][24]

C0029 Cutting Edge

During Cutting Edge, threat actors used RDP with compromised credentials for lateral movement.[25]

S0334 DarkComet

DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard.[26]

G0035 Dragonfly

Dragonfly has moved laterally via RDP.[27]

G0051 FIN10

FIN10 has used RDP to move laterally to systems in the victim environment.[28]

G1016 FIN13

FIN13 has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.[29]

G0037 FIN6

FIN6 used RDP to move laterally in victim networks.[30][31]

G0046 FIN7

FIN7 has used RDP to move laterally in victim environments.[32]

G0061 FIN8

FIN8 has used RDP for lateral movement.[33]

G0117 Fox Kitten

Fox Kitten has used RDP to log in and move laterally in the target environment.[34][35]

G1001 HEXANE

HEXANE has used remote desktop sessions for lateral movement.[36]

C0038 HomeLand Justice

During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.[37][38]

S0434 Imminent Monitor

Imminent Monitor has a module for performing remote desktop access.[39]

G1032 INC Ransom

INC Ransom has used RDP to move laterally.[40][41][42][43]

G0119 Indrik Spider

Indrik Spider has used RDP for lateral movement.[44]

S0283 jRAT

jRAT can support RDP control.[45]

G0094 Kimsuky

Kimsuky has used RDP for direct remote point-and-click access.[46]

S0250 Koadic

Koadic can enable remote desktop on the victim's machine.[47]

G0032 Lazarus Group

Lazarus Group malware SierraCharlie uses RDP for propagation.[48][49]

G0065 Leviathan

Leviathan has targeted RDP credentials and used it to move through the victim environment.[50]

G0059 Magic Hound

Magic Hound has used Remote Desktop Services to copy tools on targeted systems.[51][52]

G0045 menuPass

menuPass has used RDP connections to move across the victim network.[53][54]

S0385 njRAT

njRAT has a module for performing remote desktop access.[55]

G0049 OilRig

OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.[56][57][11]

G0040 Patchwork

Patchwork attempted to use RDP to move laterally.[58]

S0192 Pupy

Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.[59]

S0583 Pysa

Pysa has laterally moved using RDP connections.[60]

S0262 QuasarRAT

QuasarRAT has a module for performing remote desktop access.[61][62]

S0379 Revenge RAT

Revenge RAT has a plugin to perform RDP access.[63]

S0461 SDBbot

SDBbot has the ability to use RDP to connect to victim's machines.[64]

S0382 ServHelper

ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.[65]

G0091 Silence

Silence has used RDP for lateral movement.[66]

C0024 SolarWinds Compromise

During the SolarWinds Compromise, APT29 used RDP sessions from public-facing systems to internal servers.[67]

G1017 Volt Typhoon

Volt Typhoon has moved laterally to the Domain Controller via RDP using a compromised account with domain administrator privileges.[68]

S0670 WarzoneRAT

WarzoneRAT has the ability to control an infected PC using RDP.[69]

G0102 Wizard Spider

Wizard Spider has used RDP for lateral movement and to deploy ransomware interactively.[70][71][72][73]

S0350 zwShell

zwShell has used RDP for lateral movement.[74]

S0412 ZxShell

ZxShell has remote desktop functionality.[75]