Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    VU#748485: Unauthenticated configuration modification vulnerability in Central Office Services – Content Hosting Component

    April 23, 2026

    InfoSec News Nuggets 04/22/2026

    April 23, 2026

    Debian PackageKit Local Privilege Escalation Advisory DSA-6226-1

    April 23, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Microsoft adds Windows protections for malicious Remote Desktop files
    News

    Microsoft adds Windows protections for malicious Remote Desktop files

    adminBy adminApril 14, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Windows

    Microsoft has introduced new Windows protections to defend against phishing attacks that abuse Remote Desktop connection (.rdp) files, adding warnings and disabling risky shared resources by default.

    RDP files are commonly used in enterprise environments to connect to remote systems because admins can preconfigure them to automatically redirect local resources to the remote host.

    Threat actors have increasingly abused this functionality in phishing campaigns. The Russian state-sponsored APT29 hacking group has previously used rogue RDP files to remotely steal data and credentials from victims.

    Wiz

    When opened, these files can connect to attacker-controlled systems and redirect local drives to the connected device, allowing the attacker-controlled device to steal files and credentials stored on disk.

    They can also capture clipboard data, such as passwords or sensitive text, or redirect authentication mechanisms like smart cards or Windows Hello to impersonate users

    New RDP protections roll out

    As part of the April 2026 cumulative updates for Windows 10 (KB5082200) and Windows 11 (KB5083769 and KB5082052), Microsoft has now released new protections to prevent malicious RDP connection files from being used on devices.

    “Malicious actors misuse this capability by sending RDP files through phishing emails,” warns Microsoft.

    “When a victim opens the file, their device silently connects to a server controlled by the attacker and shares local resources, giving the attacker access to files, credentials, and more.”

    After installing this update, when users open an RDP file for the first time, a one-time educational prompt is shown that explains what RDP files are and warns about their risks. Windows users will then be prompted to acknowledge that they understand the risks and press OK, which will prevent the alert from being shown again.

    Educational dialog warning about the risks of RDP files
    Educational dialog warning about the risks of RDP files
    Source: Microsoft

    Future attempts to open RDP files will now display a security dialog before any connection is made.

    This dialog shows whether the RDP file is signed by a verified publisher, the remote system’s address, and lists all local resource redirections, such as drives, clipboard, or devices, with every option disabled by default.

    If a file is not digitally signed, Windows displays a “Caution: Unknown remote connection” warning and labels the publisher as unknown, indicating there is no way to verify who created the file.

    Windows warning that an RDP file is from an unverified publisher
    Windows warning that an RDP file is from an unverified publisher
    Source: Microsoft

    If the RDP file is digitally signed, Windows will display the publisher, but still warn you to verify their legitimacy before connecting.

    It should be noted that these new protections apply only to connections initiated by opening RDP files, not to those made through the Windows Remote Desktop client.

    Microsoft says that Administrators can temporarily disable these protections by going to the HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\Client Registry key and modifying the RedirectionWarningDialogVersion value so it is set to 1.

    However, as RDP files have historically been abused in attacks, it is strongly recommended to keep these protections enabled.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDebian Thunderbird Important Exec Code Issue DSA-6211-1
    Next Article Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/22/2026

    April 23, 2026
    News

    InfoSec News Nuggets 04/23/2026

    April 23, 2026
    News

    Protected: Review of Operational Collaboration between the Communications Security Establishment (CSE) and the Canadian Security Intelligence Service (CSIS): Report – HTML

    April 23, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202641 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202641 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    VU#748485: Unauthenticated configuration modification vulnerability in Central Office Services – Content Hosting Component

    April 23, 2026

    InfoSec News Nuggets 04/22/2026

    April 23, 2026

    Debian PackageKit Local Privilege Escalation Advisory DSA-6226-1

    April 23, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.