Answer the question
In order to leave comments, you need to log in
We hacked the remote and installed the miner. How to protect yourself from coolhackers?
Hello.
Some children, according to a six-year-old scheme that I found in VK, went to my computer via RDP, dropped the miner and had my video for an hour while I was sleeping. They didn’t touch anything, they carefully left a batch file (from which I realized that they also added a new user to the system) and a miner on the desktop and installed the teamviewer :D well, it all swept away quickly.
While I changed the standard port 3389 to my own. What else can be done ? Because they scan, as far as I understand, exactly open 3389 ports. Well, I’m sitting under the administrator, because I don’t seem to be paranoid and did remote work with the thought that I didn’t give up to anyone. And here cho ... No, you can first go to the VPN, and from there to the computer to cling to, but this is too much for the home network, in my opinion.
I sit thinking, how else to protect yourself from this? I just transferred everything I needed to VirtualBox in order to work remotely there, and leave the real computer alone.
Answer the question
In order to leave comments, you need to log in
> Well, I'm sitting under the admin, because I don't seem to be paranoid
Well done, cho. Now you have been flooded with a miner, next time you will be flooded with a cryptographer. But not paranoid.
. Well, I’m sitting under the administrator, because I don’t seem to be paranoid
Put up a "wall of fire", change the password to a complex one, hide behind NAT if possible, and in general, it's better not to turn on RDP.
Just under no circumstances open access from outside. Only from a trusted network or from trusted addresses.
The first option is vpn + restricting access to rdp only from the local network.
The second option is a firewall that allows remote access to only a few external addresses.
Forward an arbitrary port to 3389, use strong passwords, don't sit as root, use a whitelist when forwarding, use an "unexpected" remote client/server. If your home network does not use remote access too much, then the VPN will not decrease either. IMHO
Put the router. Well, of course, RDP to a non-standard port, the password is complex and everything else, but the main thing is not to stick around naked.
You can also leave the standard port if you set up port-knocking on
Mikrotik
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question