{"id":45415,"date":"2026-04-15T06:26:19","date_gmt":"2026-04-14T22:26:19","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-adds-windows-protections-for-malicious-remote-desktop-files\/"},"modified":"2026-04-15T06:26:19","modified_gmt":"2026-04-14T22:26:19","slug":"microsoft-adds-windows-protections-for-malicious-remote-desktop-files","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/15\/microsoft-adds-windows-protections-for-malicious-remote-desktop-files\/","title":{"rendered":"Microsoft adds Windows protections for malicious Remote Desktop files"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/05\/28\/Windows-headpic.jpg\" width=\"1600\" alt=\"Microsoft adds Windows protections for malicious Remote Desktop files\"><\/p>\n<p>Microsoft has introduced new Windows protections to defend against phishing attacks that abuse Remote Desktop connection (.rdp) files, adding warnings and disabling risky shared resources by default.<\/p>\n<p>RDP files are commonly used in enterprise environments to connect to remote systems because admins can preconfigure them to automatically redirect local resources to the remote host.<\/p>\n<p>Threat actors have increasingly abused this functionality in phishing campaigns. The Russian state-sponsored APT29 hacking group has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/amazon-seizes-domains-used-in-rogue-remote-desktop-campaign-to-steal-data\/\" target=\"_blank\" rel=\"nofollow noopener\">previously used rogue RDP files<\/a> to remotely steal data and credentials from victims.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Microsoft adds Windows protections for malicious Remote Desktop files\"><\/a> <\/div>\n<p>When opened, these files can connect to attacker-controlled systems and redirect local drives to the connected device, allowing the attacker-controlled device to steal files and credentials stored on disk.<\/p>\n<p>They can also capture clipboard data, such as passwords or sensitive text, or redirect authentication mechanisms like smart cards or Windows Hello to impersonate users<\/p>\n<h2>New RDP protections roll out<\/h2>\n<p>As part of the April 2026 cumulative updates for Windows 10 (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-releases-windows-10-kb5082200-extended-security-update\/\" target=\"_blank\" rel=\"nofollow noopener\">KB5082200<\/a>) and Windows 11 (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-cumulative-updates-kb5083769-and-kb5082052-released\/\" target=\"_blank\" rel=\"nofollow noopener\">KB5083769&nbsp;and&nbsp;KB5082052<\/a>), Microsoft has now released new protections to prevent malicious RDP connection files from being used on devices.<\/p>\n<p>&#8220;Malicious actors misuse this capability by sending RDP files through phishing emails,&#8221; <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/remote\/remote-desktop-services\/remotepc\/understanding-security-warnings\" target=\"_blank\" rel=\"nofollow noopener\">warns Microsoft<\/a>.<\/p>\n<p>&#8220;When a victim opens the file, their device silently connects to a server controlled by the attacker and shares local resources, giving the attacker access to files, credentials, and more.&#8221;<\/p>\n<p>After installing this update, when users open an RDP file for the first time, a&nbsp;one-time educational prompt is shown that explains&nbsp;what RDP files are and warns&nbsp;about their risks. Windows users will then be prompted to acknowledge that they understand the risks and press OK, which will prevent the alert from being shown again.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"203\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/Microsoft\/r\/remote-desktop-phishing-protections\/rdp-file-first-launch-dialog.png\" width=\"624\" alt=\"Microsoft adds Windows protections for malicious Remote Desktop files\"><figcaption><strong>Educational dialog warning about the risks of RDP files<\/strong><br \/><em>Source: Microsoft<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Future attempts to open RDP files will now display&nbsp;a security dialog before any connection is made.<\/p>\n<p>This dialog shows whether the RDP file is signed by a verified publisher, the&nbsp;remote system&#8217;s address, and lists all local resource redirections, such as drives, clipboard, or devices, with every option disabled by default.<\/p>\n<p>If a file is not digitally signed, Windows displays a &#8220;Caution: Unknown remote connection&#8221; warning and labels the publisher as unknown, indicating there is no way to verify who created the file.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"480\" src=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-adds-windows-protections-for-malicious-remote-desktop-files\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"565\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/Microsoft\/r\/remote-desktop-phishing-protections\/rdp-security-warning-unsigned%5B1%5D.png\" alt=\"Microsoft adds Windows protections for malicious Remote Desktop files\"><figcaption><strong>Windows warning that an RDP file is from an unverified publisher<\/strong><br \/><em>Source: Microsoft<\/em><\/figcaption><\/figure>\n<\/div>\n<p>If the RDP file is digitally signed, Windows will display the publisher, but still warn you to verify their legitimacy before connecting.<\/p>\n<p>It should be noted that these new protections apply only to connections initiated by opening RDP files, not to those made through the Windows Remote Desktop client.<\/p>\n<p>Microsoft says that Administrators can temporarily disable these protections by going to the <strong>HKLMSoftwarePoliciesMicrosoftWindows NTTerminal ServicesClient<\/strong> Registry key and modifying the <strong>RedirectionWarningDialogVersion<\/strong> value so it is set to <strong>1<\/strong>.<\/p>\n<p>However, as RDP files have historically been abused in attacks, it is strongly recommended to keep these protections enabled.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-adds-windows-protections-for-malicious-remote-desktop-files\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Microsoft adds Windows protections for malicious Remote Desktop files\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-releases-windows-10-kb5082200-extended-security-update\/\">Microsoft releases Windows 10 KB5082200 extended security update<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs\/\">Microsoft now force upgrades unmanaged Windows 11 24H2 PCs<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks\/\">New EvilTokens service fuels Microsoft device code phishing attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-windows-11-kb5086672-emergency-update-fixes-install-issues\/\">New Windows 11 emergency update fixes preview update install issues<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-kb5085516-emergency-update-fixes-microsoft-account-sign-in\/\">New KB5085516 emergency update fixes Microsoft account sign-in<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has introduced new Windows protections to def [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45415","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45415"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45415\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}