Malwarebytes Brute Force Protection (BFP)

Stand up to the rise in brute force attacks with secure remote access.


A rising threat

Remote Desktop Protocol (RDP) attacks are rising as more organizations work from home. Brute force RDP attacks from across the globe seek to gain access to an Internet-connected computer, and then use it to infect other devices and servers on the network.

Every week Malwarebytes Brute Force Protection blocks close to 1 million attacks on RDP connections world-wide.

Benefits of Malwarebytes Brute Force Protection

Brute force attack prevention

Block IP addresses that exceed a threshold of invalid login attempts.

Instant alerts

Get notified the moment an attack occurs.

Set-and-forget defense

Fully automated, around-the-clock RDP security.

Cloud-based control

Manage configurations on the Nebula platform.

Flexible protection

Control how you react to attacks via multiple modes such as ‘Monitor and Detect’ or ‘Block.’

Servers and workstations

Protect both servers and workstations from brute force attacks.

Ready to secure your RDP?

Learn more

VideoBytes video thumbnail

Our short VideoBytes episode for RDP security tips. Why brute force attacks are increasing.

Research Report

Protecting RDP connections to endpoints far and wide

Image of tools

Perkiler malware turns to SMB brute force to spread.

Brute Force FAQ

  • Restrict RDP access to only those that need it.
  • Enforce the use of strong passwords.
  • Implement two-factor authentication (2FA).
  • Use a virtual private network (VPN) to restrict access to RDP.

Brute force attacks are login attempts, but they don't look like normal users trying to log in. They can be identified by things like: The increased speed and frequency at which they occur, the unusual number of passwords used, and where the attempts originate.

Yes. In the US, UK and other jurisdictions, using a computer without its owner's permission is illegal.

Select your language