MITRE ATT&CK / T1021.001
T1021.001
Remote Desktop Protocol
Description
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services)Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the [Accessibility Features](https://attack.mitre.org/techniques/T1546/008) or [Terminal Services DLL](https://attack.mitre.org/techniques/T1505/005) for Persistence.(Citation: Alperovitch Malware)
Platforms
Mitigations
- M1047 — Audit
- M1035 — Limit Access to Resource Over Network
- M1030 — Network Segmentation
- M1028 — Operating System Configuration
- M1042 — Disable or Remove Feature or Program
- M1018 — User Account Management
- M1032 — Multi-factor Authentication
- M1026 — Privileged Account Management
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- CVE-2025-68670: Critical Pre-Auth RCE in xrdp Exposes Linux Remote Desktop Servers
- MuddyWater Uses Chaos Ransomware as False Flag in Microsoft Teams Espionage Campaign
- APT28 Targets Western Logistics and Tech Firms Supporting Ukraine Aid
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →