Attackers Abuse Remote Desktop Protocol, Microsoft Binaries
Incident responders studying last year's top attacker tools, tactics and procedures have urged cyber defenders to monitor for the unusual use of legitimate administrator tools, suspicious use of Remote Desktop Protocol, as well as attempts by attackers to hide their tracks by wiping logs.