Hit by Sodinokibi (REvil) Ransomware now I am noticing Brute Force attacks through RDP. Best practices to prevent this?

smitbret

Diamond Member
Jul 27, 2006
3,389
23
81
So, I use my personal workstation at home as the gateway for remote Window RDP into my home network. A month ago, it got hit by Sodinokibi Ransomware and all of my files got locked up. For some reason, I was only running the default Windows security software.

The one thing that slightly unnerved me was that I had some desktop shortcuts to my server and some of the files in those folders also got locked up. Nothing else on the system or network appeared or appears to have been affected.

No biggie. I have backup, I just moved the locked files to an external HDD, formatted the system and reinstalled. This time, I installed Norton Internet Security on it.

Now, every few days I will get Norton Alerts that it is blocking an RDP Brute Force Attack. It'll just pound it over and over and over again. Last time, I just reset the router and the modem (resetting my public IP address). Then I added the IP address to Norton's restricted list. I got another one today. I just restarted the system and again added the IP address to Norton's restricted list.

Question #1 - Am I overreacting and this is no big deal? Norton will keep it blocked?
Question #2 - Was I thorough in dealing with it the first time around? Did I miss something that is causing the attacks?
Question #3 - What about my setup can be tweaked to create additional security? Should I set up a cheap Windows box that does nothing except act as a Gateway and then just RDP from there to the different devices in my system?

I know some of this is pretty simple stuff and I will probably smack myself in the head and say "duh" but any guidance, even if it is "Hey dummy, why are you doing this instead of this" is greatly appreaciated.
 
Last edited by a moderator:

UsandThem

Elite Member
May 4, 2000
16,068
7,380
146
I'm not a "networking guy", so I'm not sure what they are using to keep targeting your PC. It could be something like your router/modem settings aren't configured properly (firewall, UPnP, etc.), or it could be something like your router's firmware is vulnerable. My TP Link router was way out of date as they quickly dropped support for it, and there were some pretty severe vulnerabilities that were discovered on many routers over the last few years. I ended up replacing it with a newer Asus router solely for that reason (as the wireless performance was still good on the TP Link unit). I've always used a 3rd party security program as well (mostly Norton, but this last year I switched over to Bitdefender) just as an extra layer of security because my kids and wife don't always think of computer safety when on the internet.

That would be the first things I would take a look at and make sure everything is all good there. After that is accomplished, maybe someone else can come along and give some tips/advice on the whole gateway/RDP as I am pretty clueless when it comes to that stuff as I don't do that with any of my PCs.
Here's just a few bigger router security articles over the last year or so:

https://www.bleepingcomputer.com/ne...r-bug-lets-attackers-login-without-passwords/
https://www.tomsguide.com/news/netgear-security-firmware-patches
 

VirtualLarry

No Lifer
Aug 25, 2001
56,448
10,117
126
"Raw RDP" exposed directly on the internet can be quite a juicy target, as you've found out.

You should put it behind a VPN server, at least, this is my understanding for RDP "best practices". Or use something other than RDP, like AnyDesk or TeamViewer, that don't require exposing a listening port to the open internet.
 
Reactions: ch33zw1z

Amol S.

Platinum Member
Mar 14, 2015
2,397
709
136
Most of the time, there are hackers that try to hack random IP addresses, and there are many that do that. You also are setting your security policy incorrectly. You should not be using a blacklist, but rather should use a whitelist. Just whitelist the IP Addresses you know you are going to connect from to the RDP.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |