
Exposed Remote Desktop Protocol actively targeted by Threat Actors to deploy Ransomware
Exposed Remote Desktop Protocol actively targeted by Threat Actors to deploy Ransomware
Cyble analyzes recent Threat Actor behavior and their targeting of exposed Remote Desktop Protocol to deploy Ransomware.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content.
If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary.
All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation.
All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue.
No Liability for Errors or Omissions
Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.
Threat Landscape Reports 2025
Upcoming Webinars

CISO’s Guide to Threat Intelligence 2024: Best Practices
Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now
Share the Post:
