Attackers will use valid credentials to move laterally in the environment by utilizing remote desktop.

Malware/Threat actors

Preventions

<Mitigation techniques>

Detections

<Detection techniques>

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References

  • [<Source name>](<Source link>)