<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cybersecurity Insurance denied due to RDS Gateway in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/55406#M718</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1586937603"&gt;@chozn&lt;/a&gt;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/753763957"&gt;@ITProJeff&lt;/a&gt;Could CVE-2020-610 be what they were thinking about?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;CVE-2020-610 was mitigated with routine monthly patches in Jan 2020. If the single vulnerability were the target of concern, I would think the finding would have been "failure to promptly apply patches", not "we hate RDP gateway".&lt;/P&gt;</description>
    <pubDate>Sun, 27 Nov 2022 00:14:01 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2022-11-27T00:14:01Z</dc:date>
    <item>
      <title>Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47513#M383</link>
      <description>&lt;P&gt;I recently had a client get denied Cybersecurity Insurance due to their RDS Gateway being exposed to the internet (this is RDS Gateway on port 443/3391, not Remote Desktop port 3389). Their claim was that "Current threat actor activity on the internet is focusing on targeting this technology to deploy ransomware and other malware." We had GeoIP filtering restricting access to USA only, MFA, and a brute-force detection/IP blocking software installed. Their only solution was to put it behind a VPN or disable it altogether. We're currently pressing them to find out if that's also required for Citrix Netscaler or VMWare Horizon since they're exposed to the internet as well and can (and have) had vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have not heard of any "threat actor activity" actively exploiting RDS Gateway and am wondering if the new standard is not exposing it to the internet and I missed that? Is everyone else putting it behind a VPN and praying for no or low vulnerabilities on that?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 00:44:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47513#M383</guid>
      <dc:creator>ITProJeff</dc:creator>
      <dc:date>2021-09-15T00:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47516#M384</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;This was insane, but we survived it somehow. The hackers managed to RDP directly into our primary backup server with an old administrator account that was created before password complexity requirements were in place(probably either blank or under 4 characters). They ran their scripts which encrypted everything on that machine plus every shared folder visible from that machine using administrator credentials. The damage was widespread as we have lots of shared drives nearing 10TB of data.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;The only thing that saved us was our secondary off-site backup that had zero shared folders. It was backed up using Quest which was not visible though windows fileshare services.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;This happened Thursday at 11pm CST. As of this morning we are 100% back up.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;PSA, if your backup locations are being shared on the network, DHARMA will find it. I used to store my backups that way and would have been screwed if it was still setup like that. Also, block RDP at your firewalls. Your employees should be using VPN to get in then RDP anyways.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Edit: We have RDP blocked at the firewall. I just mentioned it because that is how they usually get in, by abusing RDP vulnerabilities. We are still looking into how they might have gotten access, but unfortunately without a dedicated log server it probably won't happen.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 15:13:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47516#M384</guid>
      <dc:creator>rapheal21</dc:creator>
      <dc:date>2021-09-15T15:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47523#M385</link>
      <description>&lt;P&gt;Can you confirm that you had RDP open to the internet and NAT'd to that server and were not using Remote Desktop Gateway? I'm specifically talking about Remote Desktop Gateway (port 443).&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 16:46:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47523#M385</guid>
      <dc:creator>ITProJeff</dc:creator>
      <dc:date>2021-09-15T16:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47528#M386</link>
      <description>&lt;P&gt;I'm going to wager the insurance company, just like&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/703247301"&gt;@rapheal21&lt;/a&gt;, misunderstood the difference between allowing regular RDP access to the internal network vs. using RDP to connect to an RD Gateway. I wasn't able to find any CVE's related to using an RD Gateway server this year but they may have more intel than we do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you able to get the exact reasons from their insurance carrier? Sounds like adding a VPN would just open up the attack surface even more because now you'll have to make sure that product is patched and configured correctly. Not to mention adding two additional remote login steps with 2FA to the VPN and using 2FA again on the RD Gateway login. Also wondering if the VPN would circumvent some of the granular resource access that you configured in the RD Gateway server (just thinking out loud)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully we have some threat researchers within the Community that may shed some light on RD Gateway vulns.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:50:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47528#M386</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-09-15T18:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47529#M387</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I haven't heard of "threat actor activity" actively exploiting RDS Gateway recently either, but I've somehow had this discussion in the past.&lt;/SPAN&gt;&amp;nbsp;I didn't yet raise my bar, but with RDP there's always a risk of MITM and it seems the industry in overall wants to harden its security by putting the RDP gateway behind VPN defense-in-depth fashion. Not totally absurd.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 22:20:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47529#M387</guid>
      <dc:creator>junghyun</dc:creator>
      <dc:date>2021-09-15T22:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47530#M388</link>
      <description>&lt;P&gt;Thank you for the reply. Their email to use did indicate Remote Desktop Gateway instead of RDP, but I agree they're likely may not understand the difference. That's one of the things we're pressing them on. Aside from user frustration and the infrastructure/licensing needed to add the VPN as a layer you are correct is does open up another attack vector, effectively trading one for the other. Perhaps in their mind it's worth it. I'm also thinking since RDS Gateway won't show up in any scans (Shodan for example) they're simply skip past us.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 22:44:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47530#M388</guid>
      <dc:creator>ITProJeff</dc:creator>
      <dc:date>2021-09-15T22:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47536#M389</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1562960757"&gt;@junghyun&lt;/a&gt;&amp;nbsp;I may be wrong but I thought they fixed the MITM issue by admins installing a cert on the end device and RD Gateway that would verify each endpoint and encrypt the channel upon connection? I'm not super familiar with it because we use a VPN for remote instead&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":upside_down_face:"&gt;🙃&lt;/span&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/753763957"&gt;@ITProJeff&lt;/a&gt;&amp;nbsp;Yeah anything with RDP in it is a dirty word nowadays. Protocol-that-must-not-be-named.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 13:13:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47536#M389</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-09-16T13:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47540#M390</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;&amp;nbsp;Thanks for asking. There hasn't been a report of MITM with RD gateway that I know of, it's mostly in account of RDP, and as was mentioned in the previous thread it's technically unrelated. My worry is, unfortunately the industry seems to treat RD gateway and RDP alike functionally, mistakenly or intentionally.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 15:05:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47540#M390</guid>
      <dc:creator>junghyun</dc:creator>
      <dc:date>2021-09-16T15:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47565#M391</link>
      <description>&lt;P&gt;Appreciate all the replied. Does anyone have experience with a technical solution other than a VPN?&lt;/P&gt;&lt;P&gt;The options I'm thinking are:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1. Behind VPN in firewall&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2. Behind dedicated VPN appliance&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3.&amp;nbsp;Azure AD proxy? I believe this would work to hide the RDWeb site, but would RDP shortcuts configured&amp;nbsp; &amp;nbsp; &amp;nbsp;with the RDS gateway address still work?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;4. Cloudflare option?&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Sep 2021 01:08:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47565#M391</guid>
      <dc:creator>ITProJeff</dc:creator>
      <dc:date>2021-09-18T01:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47788#M394</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/753763957"&gt;@ITProJeff&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Think laterally, given the attacks on VPN, look to SDN's, Hybrid Cloud architecture and Secure Access Security Edge (SASE), but do your homework, some are built from the ground up, different approach, some are based on hardware legacy systems, and others are just additions to existing approaches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ditch the VPN, and move towards SASE and Zero Trust approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 04:48:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/47788#M394</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-10-08T04:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/50729#M530</link>
      <description>&lt;P&gt;I agree - VPN is being phased out by many organizations. Attacks do come from remote users over the IPSEC tunnel - I have seen that happen to companies we have assisted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyhow, SASE is good for securing RDP. Azure App Proxy and TruGrid SecureRDP are two good products for securing RD Gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 15:31:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/50729#M530</guid>
      <dc:creator>KPA</dc:creator>
      <dc:date>2022-04-26T15:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/55401#M717</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/753763957"&gt;@ITProJeff&lt;/a&gt;Could CVE-2020-610 be what they were thinking about? &lt;SPAN&gt;"A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP. The update addresses the vulnerability by correcting how RD Gateway handles connection requests."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Nov 2022 17:18:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/55401#M717</guid>
      <dc:creator>chozn</dc:creator>
      <dc:date>2022-11-26T17:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/55406#M718</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1586937603"&gt;@chozn&lt;/a&gt;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/753763957"&gt;@ITProJeff&lt;/a&gt;Could CVE-2020-610 be what they were thinking about?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;CVE-2020-610 was mitigated with routine monthly patches in Jan 2020. If the single vulnerability were the target of concern, I would think the finding would have been "failure to promptly apply patches", not "we hate RDP gateway".&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 00:14:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/55406#M718</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2022-11-27T00:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Insurance denied due to RDS Gateway</title>
      <link>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/57944#M778</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Zero Trust solution is the way to go nowadays for accessing RDS / RDP or VDI over the internet. More below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We hear more and more about Cybersecurity Insurance companies denying coverage due to RD Gateway / RD Web over TCP 443 (HTTPS), even with 2FA. The reasons vary, but they all center around known attacks against these solutions. Please see below two references:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;A href="https://www.cvedetails.com/cve/CVE-2020-0609/" target="_blank" rel="noopener"&gt;CVE-2020-0609 : A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated atta (cvedetails.com)&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://raxis.com/blog/rd-web-access-vulnerability" target="_blank" rel="noopener"&gt;Microsoft’s Remote Desktop Web Access Vulnerability — Raxis&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Since you asked, similar attacks can affect most gateway technologies to VDIs - such as Citrix NetScaler. See below 8 CVEs for NetScaler: &lt;A href="https://www.cvedetails.com/vulnerability-list/vendor_id-422/product_id-12586/Citrix-Netscaler.html" target="_blank" rel="noopener"&gt;Citrix Netscaler : List of security vulnerabilities (cvedetails.com)&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;VPN has its own issues since all remote VPN connections become an extension of the corporate network and a breach on the remote network can traverse the VPN tunnel to infect the corporate network&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Popular solutions today include the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Azure Virtual Desktop or Microsoft 365. These solutions use Azure control plane to provide cloud authentication that is separate from the resource network. Essentially, there is zero firewall exposure where your RDS / RDP servers are and users must authenticate at the Azure cloud before access is granted. Microsoft calls this "reverse connect". Unfortunately, this solution is limited to Azure Cloud&lt;/LI&gt;&lt;LI&gt;Both AWS and Azure also have a solution called "Bastions" - but also limited to their respective cloud&lt;/LI&gt;&lt;LI&gt;One solution that works on any cloud or datacenter is TruGrid SecureRDP. Here is a video on how it works:&amp;nbsp;&lt;A href="https://help.trugrid.com/en/article/how-trugrid-securerdp-works-1oshvlv/" target="_blank" rel="noopener"&gt;How TruGrid SecureRDP Works | TruGrid Help&lt;/A&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the best.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 09:25:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Cybersecurity-Insurance-denied-due-to-RDS-Gateway/m-p/57944#M778</guid>
      <dc:creator>KPA</dc:creator>
      <dc:date>2023-03-21T09:25:41Z</dc:date>
    </item>
  </channel>
</rss>

