Remote Services: Remote Desktop Protocol, Sub-technique T1021.001 - Enterprise | MITRE ATT&CK®
Currently viewing
ATT&CK v17.1
which was live between April 22, 2025 and October 27, 2025.
Learn more about the versioning system
or
see the live site
Techniques
Enterprise
Remote Services
Remote Desktop Protocol
Remote Services:
Remote Desktop Protocol
Other sub-techniques of Remote Services (8)
ID
Name
T1021.001
Remote Desktop Protocol
T1021.002
SMB/Windows Admin Shares
T1021.003
Distributed Component Object Model
T1021.004
SSH
T1021.005
VNC
T1021.006
Windows Remote Management
T1021.007
Cloud Services
T1021.008
Direct Cloud VM Connections
Adversaries may use
Valid Accounts
to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.
Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).
[1]
Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the
Accessibility Features
or
Terminal Services DLL
for Persistence.
[2]
ID:
T1021.001
Sub-technique of:
T1021
Tactic:
Lateral Movement
Platforms:
Windows
Contributors:
Matthew Demaske, Adaptforward
Version:
1.3
Created:
11 February 2020
Last Modified:
15 April 2025
Version Permalink
Live Version
Procedure Examples
ID
Name
Description
G1030
Agrius
Agrius
tunnels RDP traffic through deployed web shells to access victim environments via compromised accounts.
[3]
Agrius
used the Plink tool to tunnel RDP connections for remote access and lateral movement in victim environments.
[4]
G1024
Akira
Akira
has used RDP for lateral movement.
[5]
G0006
APT1
The
APT1
group is known to have used RDP during operations.
[6]
C0051
APT28 Nearest Neighbor Campaign
During
APT28 Nearest Neighbor Campaign
APT28
used RDP for lateral movement.
[7]
G0022
APT3
APT3
enables the Remote Desktop Protocol for persistence.
[8]
APT3
has also interacted with compromised systems to browse and copy files through RDP sessions.
[9]
G0087
APT39
APT39
has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions.
[10]
[11]
G0096
APT41
APT41
used RDP for lateral movement.
[12]
[13]
APT41
used NATBypass to expose local RDP ports on compromised systems to the Internet.
[14]
G1023
APT5
APT5
has moved laterally throughout victim environments using RDP.
[15]
G0143
Aquatic Panda
Aquatic Panda
leveraged stolen credentials to move laterally via RDP in victim environments.
[16]
G0001
Axiom
Axiom
has used RDP during operations.
[17]
G1043
BlackByte
BlackByte
has used RDP to access other hosts within victim networks.
[18]
[19]
G0108
Blue Mockingbird
Blue Mockingbird
has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts.
[20]
C0015
C0015
During
C0015
, the threat actors used RDP to access specific network hosts of interest.
[21]
C0018
C0018
During
C0018
, the threat actors opened a variety of ports to establish RDP connections, including ports 28035, 32467, 41578, and 46892.
[22]
C0032
C0032
During the
C0032
campaign,
TEMP.Veles
utilized RDP throughout an operation.
[23]
S0030
Carbanak
Carbanak
enables concurrent Remote Desktop Protocol (RDP) sessions.
[24]
G0114
Chimera
Chimera
has used RDP to access targeted systems.
[25]
G0080
Cobalt Group
Cobalt Group
has used Remote Desktop Protocol to conduct lateral movement.
[26]
S0154
Cobalt Strike
Cobalt Strike
can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel.
[27]
[28]
C0029
Cutting Edge
During
Cutting Edge
, threat actors used RDP with compromised credentials for lateral movement.
[29]
S0334
DarkComet
DarkComet
can open an active screen of the victim’s machine and take control of the mouse and keyboard.
[30]
G0035
Dragonfly
Dragonfly
has moved laterally via RDP.
[31]
G0051
FIN10
FIN10
has used RDP to move laterally to systems in the victim environment.
[32]
G1016
FIN13
FIN13
has remotely accessed compromised environments via Remote Desktop Services (RDS) for lateral movement.
[33]
G0037
FIN6
FIN6
used RDP to move laterally in victim networks.
[34]
[35]
G0046
FIN7
FIN7
has used RDP to move laterally in victim environments.
[36]
G0061
FIN8
FIN8
has used RDP for lateral movement.
[37]
G0117
Fox Kitten
Fox Kitten
has used RDP to log in and move laterally in the target environment.
[38]
[39]
G1001
HEXANE
HEXANE
has used remote desktop sessions for lateral movement.
[40]
C0038
HomeLand Justice
During
HomeLand Justice
, threat actors primarily used RDP for lateral movement in the victim environment.
[41]
[42]
S0434
Imminent Monitor
Imminent Monitor
has a module for performing remote desktop access.
[43]
G1032
INC Ransom
INC Ransom
has used RDP to move laterally.
[44]
[45]
[46]
[47]
G0119
Indrik Spider
Indrik Spider
has used RDP for lateral movement.
[48]
S0283
jRAT
jRAT
can support RDP control.
[49]
G0094
Kimsuky
Kimsuky
has used RDP for direct remote point-and-click access.
[50]
S0250
Koadic
Koadic
can enable remote desktop on the victim's machine.
[51]
G0032
Lazarus Group
Lazarus Group
malware SierraCharlie uses RDP for propagation.
[52]
[53]
G0065
Leviathan
Leviathan
has targeted RDP credentials and used it to move through the victim environment.
[54]
G0059
Magic Hound
Magic Hound
has used Remote Desktop Services to copy tools on targeted systems.
[55]
[56]
G0045
menuPass
menuPass
has used RDP connections to move across the victim network.
[57]
[58]
S0385
njRAT
njRAT
has a module for performing remote desktop access.
[59]
G0049
OilRig
OilRig
has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.
[60]
[61]
[13]
[62]
[62]
G0040
Patchwork
Patchwork
attempted to use RDP to move laterally.
[63]
S0192
Pupy
Pupy
can enable/disable RDP connection and can start a remote desktop session using a browser web socket client.
[64]
S0583
Pysa
Pysa
has laterally moved using RDP connections.
[65]
S0262
QuasarRAT
QuasarRAT
has a module for performing remote desktop access.
[66]
[67]
S1187
reGeorg
reGeorg
can be used to tunnel RDP connections.
[68]
S0379
Revenge RAT
Revenge RAT
has a plugin to perform RDP access.
[69]
S0461
SDBbot
SDBbot
has the ability to use RDP to connect to victim's machines.
[70]
S0382
ServHelper
ServHelper
has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel.
[71]
G0091
Silence
Silence
has used RDP for lateral movement.
[72]
C0024
SolarWinds Compromise
During the
SolarWinds Compromise
APT29
used RDP sessions from public-facing systems to internal servers.
[73]
G1017
Volt Typhoon
Volt Typhoon
has moved laterally to the Domain Controller via RDP using a compromised account with domain administrator privileges.
[74]
S0670
WarzoneRAT
WarzoneRAT
has the ability to control an infected PC using RDP.
[75]
G0102
Wizard Spider
Wizard Spider
has used RDP for lateral movement and to deploy ransomware interactively.
[76]
[77]
[78]
[79]
S0350
zwShell
zwShell
has used RDP for lateral movement.
[80]
S0412
ZxShell
ZxShell
has remote desktop functionality.
[81]
Mitigations
ID
Mitigation
Description
M1047
Audit
Audit the Remote Desktop Users group membership regularly. Remove unnecessary accounts and groups from Remote Desktop Users groups.
M1042
Disable or Remove Feature or Program
Disable the RDP service if it is unnecessary.
M1035
Limit Access to Resource Over Network
Use remote desktop gateways.
M1032
Multi-factor Authentication
Use multi-factor authentication for remote logins.
[82]
M1030
Network Segmentation
Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network.
M1028
Operating System Configuration
Change GPOs to define shorter timeouts sessions and maximum amount of time any single session can be active. Change GPOs to specify the maximum amount of time that a disconnected session stays active on the RD session host server.
[83]
M1026
Privileged Account Management
Consider removing the local Administrators group from the list of groups allowed to log in through RDP.
M1018
User Account Management
Limit remote user permissions if remote access is necessary.
Detection
ID
Data Source
Data Component
Detects
DS0028
Logon Session
Logon Session Creation
Monitor for user accounts logged into systems associated with RDP (ex: Windows EID 4624 Logon Type 10). Other factors, such as access patterns (ex: multiple systems over a relatively short period of time) and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP.
Monitoring logon and logoff events for hosts on the network is very important for situational awareness. This information can be used as an indicator of unusual activity as well as to corroborate activity seen elsewhere.
Could be applied to a number of different types of monitoring depending on what information is desired. Some use cases include monitoring for all remote connections and building login timelines for users. Logon events are Windows Event Code 4624 for Windows Vista and above, 518 for pre-Vista. Logoff events are 4634 for Windows Vista and above, 538 for pre-Vista.
Note: This analytic looks for user logon events and filters out the top 30 account names to reduce the occurrence of noisy service accounts and the like. It is meant as a starting point for situational awareness around such events. This is liable to be quite noisy and will need tweaking, especially in terms of the number of top users filtered out.
Analytic 1
sourcetype="WinEventLog:Security" EventCode IN (4624, 4634, 4647, 4778, 4779)| search LogonType=10 // RDP Interactive Logon| eval is_suspicious=if((user!="expected_users") AND (dest_ip!="expected_servers"), "True", "False")| where is_suspicious="True"
Logon Session Metadata
Monitor authentication logs and analyze for unusual access patterns. A remote desktop logon, through RDP, may be typical of a system administrator or IT support, but only from select workstations. Monitoring remote desktop logons and comparing to known/approved originating systems can detect lateral movement of an adversary.
Analytic 1
sourcetype="WinEventLog:Security" EventCode="4624" AND LogonType="10" AND AuthenticationPackageName="Negotiate" AND TargetUserName="Admin*")
DS0029
Network Traffic
Network Connection Creation
Monitor for newly constructed network connections (typically over port 3389) that may use
Valid Accounts
to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP.
Analytic 1 - Abnormal RDP Network Connections
sourcetype=zeek | search dest_port=3389 // Default RDP port| stats count by src_ip, dest_ip, dest_port| where src_ip!="trusted_ips" AND dest_ip!="internal_servers"
Network Traffic Flow
Monitor network traffic for uncommon data flows that may use
Valid Accounts
to log into a computer using the Remote Desktop Protocol (RDP).
The Remote Desktop Protocol (RDP), built in to Microsoft operating systems, allows a user to remotely log in to the desktop of another host. It allows for interactive access of the running windows, and forwards key presses, mouse clicks, etc. Network administrators, power users, and end-users may use RDP for day-to-day operations. From an adversary’s perspective, RDP provides a means to laterally move to a new host. Determining which RDP connections correspond to adversary activity can be a difficult problem in highly dynamic environments, but will be useful in identifying the scope of a compromise.Remote Desktop can be detected in several ways
Network connections to port 3389/tcp (assuming use of the default port)
Packet capture analysis
Detecting network connections from
mstsc.exe
Execution of the process
rdpclip.exe
Runs as the clipboard manager on the RDP target if clipboard sharing is enabled
Analytic 1 - Suspicious RDP
sourcetype=netflow LogonType="10"| search dest_port=3389 // Default RDP port| stats count by src_ip, dest_ip, dest_port| where src_ip!="trusted_ips" AND dest_ip!="internal_servers"
DS0009
Process
Process Creation
Monitor for newly executed processes (such as
mstsc.exe
) that may use
Valid Accounts
to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions that spawn additional processes as the logged-on user.
Analytic 1 - Unusual processes associated with RDP sessions
sourcetype=WinEventLog:Microsoft-Windows-Sysmon/Operational EventCode=1 | search (parent_process="mstsc.exe" OR parent_process="rdpclip.exe")| table _time, host, user, process_name, parent_process, command_line| where process_name!="expected_processes"
References
Microsoft. (n.d.). Remote Desktop Services. Retrieved June 1, 2016.
Alperovitch, D. (2014, October 31). Malware-Free Intrusions. Retrieved November 17, 2024.
Amitai Ben & Shushan Ehrlich. (2021, May). From Wiper to Ransomware: The Evolution of Agrius. Retrieved May 21, 2024.
Or Chechik, Tom Fakterman, Daniel Frank & Assaf Dahan. (2023, November 6). Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors. Retrieved May 22, 2024.
Nutland, J. and Szeliga, M. (2024, October 21). Akira ransomware continues to evolve. Retrieved December 10, 2024.
FireEye Labs. (2014, May 20). The PLA and the 8:00am-5:00pm Work Day: FireEye Confirms DOJ’s Findings on APT1 Intrusion Activity. Retrieved November 17, 2024.
Koessel, Sean. Adair, Steven. Lancaster, Tom. (2024, November 22). The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access. Retrieved February 25, 2025.
valsmith. (2012, September 21). More on APTSim. Retrieved September 28, 2017.
Glyer, C. (2018, April 14). @cglyer Status Update. Retrieved September 12, 2024.
Hawley et al. (2019, January 29). APT39: An Iranian Cyber Espionage Group Focused on Personal Information. Retrieved February 19, 2019.
Rusu, B. (2020, May 21). Iranian Chafer APT Targeted Air Transportation and Government in Kuwait and Saudi Arabia. Retrieved May 22, 2020.
Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
Crowdstrike. (2020, March 2). 2020 Global Threat Report. Retrieved December 11, 2020.
DCSO CyTec Blog. (2022, December 24). APT41 — The spy who failed to encrypt me. Retrieved June 13, 2024.
Perez, D. et al. (2021, May 27). Re-Checking Your Pulse: Updates on Chinese APT Actors Compromising Pulse Secure VPN Devices. Retrieved February 5, 2024.
CrowdStrike. (2023). 2022 Falcon OverWatch Threat Hunting Report. Retrieved May 20, 2024.
Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
Microsoft Incident Response. (2023, July 6). The five-day job: A BlackByte ransomware intrusion case study. Retrieved December 16, 2024.
James Nutland, Craig Jackson, Terryn Valikodath, & Brennan Evans. (2024, August 28). BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks. Retrieved December 16, 2024.
Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.
DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.
Costa, F. (2022, May 1). RaaS AvosLocker Incident Response Analysis. Retrieved January 11, 2023.
Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.
Bennett, J., Vengerik, B. (2017, June 12). Behind the CARBANAK Backdoor. Retrieved June 11, 2018.
Cycraft. (2020, April 15). APT Group Chimera - APT Operation Skeleton key Targets Taiwan Semiconductor Vendors. Retrieved August 24, 2020..
Matveeva, V. (2017, August 15). Secrets of Cobalt. Retrieved October 10, 2018.
Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.
Meltzer, M. et al. (2024, January 10). Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN. Retrieved February 27, 2024.
Kujawa, A. (2018, March 27). You dirty RAT! Part 1: DarkComet. Retrieved November 6, 2018.
US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
FireEye iSIGHT Intelligence. (2017, June 16). FIN10: Anatomy of a Cyber Extortion Operation. Retrieved November 17, 2024.
Ta, V., et al. (2022, August 8). FIN13: A Cybercriminal Threat Actor Focused on Mexico. Retrieved February 9, 2023.
FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved November 17, 2024.
McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019.
Loui, E. and Reynolds, J. (2021, August 30). CARBON SPIDER Embraces Big Game Hunting, Part 1. Retrieved September 20, 2021.
Elovitz, S. & Ahl, I. (2016, August 18). Know Your Enemy: New Financially-Motivated & Spear-Phishing Group. Retrieved February 26, 2018.
CISA. (2020, September 15). Iran-Based Threat Actor Exploits VPN Vulnerabilities. Retrieved December 21, 2020.
ClearSky. (2020, December 17). Pay2Key Ransomware – A New Campaign by Fox Kitten. Retrieved December 21, 2020.
SecureWorks 2019, August 27 LYCEUM Takes Center Stage in Middle East Campaign Retrieved. 2019/11/19
CISA. (2022, September 23). AA22-264A Iranian State Actors Conduct Cyber Operations Against the Government of Albania. Retrieved August 6, 2024.
MSTIC. (2022, September 8). Microsoft investigates Iranian attacks against the Albanian government. Retrieved August 6, 2024.
QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.
Cybereason Security Research Team. (2023, November 20). Threat Alert: INC Ransomware. Retrieved June 5, 2024.
Team Huntress. (2023, August 11). Investigating New INC Ransom Group Activity. Retrieved June 5, 2024.
SOCRadar. (2024, January 24). Dark Web Profile: INC Ransom. Retrieved June 5, 2024.
Carvey, H. (2024, May 1). LOLBin to INC Ransomware. Retrieved June 5, 2024.
Mandiant Intelligence. (2022, June 2). To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions. Retrieved July 29, 2024.
Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.
ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.
Magius, J., et al. (2017, July 19). Koadic. Retrieved September 27, 2024.
Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Remote Administration Tools & Content Staging Malware Report. Retrieved March 16, 2016.
Plan, F., et al. (2019, March 4). APT40: Examining a China-Nexus Espionage Actor. Retrieved March 18, 2019.
DFIR Report. (2022, March 21). APT35 Automates Initial Access Using ProxyShell. Retrieved May 25, 2022.
DFIR Report. (2021, November 15). Exchange Exploit Leads to Domain Wide Ransomware. Retrieved January 5, 2023.
PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.
US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020.
Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.
Unit42. (2016, May 1). Evasive Serpens Unit 42 Playbook Viewer. Retrieved February 6, 2023.
Davis, S. and Caban, D. (2017, December 19). APT34 - New Targeted Attack in the Middle East. Retrieved December 20, 2017.
Symantec Threat Hunter Team. (2023, October 19). Crambus: New Campaign Targets Middle Eastern Government. Retrieved November 27, 2024.
Cymmetria. (2016). Unveiling Patchwork - The Copy-Paste APT. Retrieved November 17, 2024.
Nicolas Verdier. (n.d.). Retrieved January 29, 2018.
CERT-FR. (2020, April 1). ATTACKS INVOLVING THE MESPINOZA/PYSA RANSOMWARE. Retrieved March 1, 2021.
MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.
Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
FortiGard Labs. (2019, March 12). ReGeorg.HTTP.Tunnel. Retrieved December 3, 2024.
Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019.
Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.
Schwarz, D. and Proofpoint Staff. (2019, January 9). ServHelper and FlawedGrace - New malware introduced by TA505. Retrieved May 28, 2019.
Group-IB. (2018, September). Silence: Moving Into the Darkside. Retrieved May 5, 2020.
CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022.
CISA et al.. (2024, February 7). PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure. Retrieved May 15, 2024.
Harakhavik, Y. (2020, February 3). Warzone: Behind the enemy lines. Retrieved December 17, 2021.
John, E. and Carvey, H. (2019, May 30). Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER. Retrieved May 12, 2020.
DHS/CISA. (2020, October 28). Ransomware Activity Targeting the Healthcare and Public Health Sector. Retrieved October 28, 2020.
The DFIR Report. (2020, November 5). Ryuk Speed Run, 2 Hours to Ransom. Retrieved November 6, 2020.
Shilko, J., et al. (2021, October 7). FIN12: The Prolific Ransomware Intrusion Threat Actor That Has Aggressively Pursued Healthcare Targets. Retrieved June 15, 2023.
McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.
Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.
Berkeley Security, University of California. (n.d.). Securing Remote Desktop for System Administrators. Retrieved November 4, 2014.
Microsoft. (n.d.). Configure Timeout and Reconnection Settings for Remote Desktop Services Sessions. Retrieved December 11, 2017.
US