Rdp.txt
RDP.txt might look like a simple note, but in the wrong hands, it’s a roadmap to your entire network. Always verify the source and keep your credentials out of plaintext files.
If you are an IT professional, seeing an unexpected RDP.txt should trigger an immediate incident response. Here is how to stay ahead:
The attacker has a list of targets ready for a brute-force attack. RDP.txt
Use EDR (Endpoint Detection and Response) tools to alert you whenever a process creates a .txt file containing IP addresses or login strings.
In many documented attacks, a RDP.txt file found on a desktop or in a staging folder is a "smoking gun" indicating that: Here is how to stay ahead: The attacker
Generally, RDP.txt is used as a flat-file database to store lists of IP addresses or hostnames for Remote Desktop Protocol (RDP) management. However, its purpose changes drastically depending on who created it:
Look for unusual login patterns or unauthorized use of mstsc.exe . However, its purpose changes drastically depending on who
Criminal groups, including the notorious collective, utilize automated scanners to find open RDP ports. These scanners often output their "hits"—the IP addresses of vulnerable servers—into text files for later exploitation. Akamai Blog
