• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Inbound VNC Traffic from an Unusual Location

Risk Factors

The VNC desktop-sharing system is a common target for attackers because it provides remote access to other devices. Attackers can find weak VNC passwords through low-cost techniques such as brute force attacks or by exploiting VNC server vulnerabilities to bypass authentication. The impact to a business can be low if the connection attempt fails or if the attacker connects to a device with limited privileges. However, these activities should be examined before they facilitate critical and costly attacks.

The system might change the risk score for this detection.

Kill Chain

Command-and-Control

Risk Score

41

Next in Command-and-Control: Internal ICMP Tunnel Activity

Attack Background

Mitigation Options

Disable internal services that are exposed to the internet, especially services that run over remote access protocols

Disable or uninstall VNC unless required

Disable guest access to prevent anonymous users from establishing VNC connections without a password

Review access controls to ensure that only authorized users can connect through VNC

MITRE ATT&CK ID

What else can RevealX do for you?