RPC is a widely used protocol for communication between systems in enterprise networks. It’s also a prime target for attackers.
This type of attack leverages the remote procedure call (RPC) — a protocol that allows one computer program to request a service or execute a procedure on another program located on a remote computer. Enterprises use it so networked systems can communicate and perform operations without requiring detailed knowledge of the other program’s structure or specifics of the network.
While RPC is widely used to simplify communication between operating systems, it also poses a significant vulnerability that attackers can leverage. In RPC attacks, attackers exploit the protocol to gain unauthorized access, escalate privileges, or execute malicious code on a remote system.
Attackers abuse RPCs to conduct various malicious activities such as:
Attackers use RPC because it’s often harder to detect compared to a port sweep or port scan. They can use it to fly under the radar while conducting reconnaissance. For this reason, RPC server vulnerabilities are frequently exploited to gain details about network shares, services, users, and other resources.
RPC attacks are a serious security concern due to RPC's broad functionality and network accessibility. By monitoring network activity, applying patches promptly, and using tools like the Vectra AI Platform to monitor for signs of RPC abuse, cybersecurity professionals can reduce the risk of these threats. That’s why Vectra AI provides AI-driven detections like RPC recon and RPC targeted recon — to identify when attackers appear to be using the RPC protocol to gather information on network resources so SOC teams can stop them fast.