Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Large Botnet Targets US RDP Services Globally

Large Botnet Targets US RDP Services Globally

by Tekmono Editorial Team
14/10/2025
in News
Share on FacebookShare on Twitter

A large-scale campaign is targeting Remote Desktop Protocol (RDP) services in the United States, utilizing a botnet of more than 100,000 IP addresses. The activity began on October 8, and researchers at the threat monitoring platform GreyNoise believe the attacks originate from a multi-country botnet.

RDP is a network protocol that allows for remote connection and control of Windows systems, commonly used by system administrators, helpdesk staff, and remote employees. Attackers frequently scan for open RDP ports to conduct brute-force logins, exploit vulnerabilities, or perform other attacks.

GreyNoise researchers identified that the botnet employs two specific RDP-related attack methods. The first is an RD Web Access timing attack, where the botnet probes endpoints and measures differences in server response times during anonymous authentication to infer valid usernames. The second method is an RDP web client login enumeration, which interacts with the login process to identify user accounts by observing differing server behaviors and responses.

Related Reads

OpenAI Launches Customizable Skills for Codex Coding Agent

Amazon’s Alexa+ to Integrate with Four New Services

EA Investigated for AI-Generated Content in Battlefield 6

Apple to Start iPhone 18 Production in January

The campaign was first detected following an unusual spike in traffic originating from Brazil. Activity subsequently emerged from other countries, including Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to GreyNoise, the compromised devices that form the botnet are located in more than 100 countries.

A technical analysis revealed that nearly all of the attacking IP addresses share a common TCP fingerprint. Minor variations in the Maximum Segment Size are believed to be caused by different clusters within the botnet. To mitigate this threat, GreyNoise recommends that system administrators block the identified attacking IP addresses and review system logs for signs of suspicious RDP probing.

As a security best practice, organizations are advised not to expose RDP services directly to the public internet. Implementing a Virtual Private Network (VPN) and requiring multi-factor authentication (MFA) can provide additional layers of protection against such attacks.

ShareTweet

You Might Be Interested

OpenAI Launches Customizable Skills for Codex Coding Agent
News

OpenAI Launches Customizable Skills for Codex Coding Agent

24/12/2025
Amazon’s Alexa+ to Integrate with Four New Services
News

Amazon’s Alexa+ to Integrate with Four New Services

24/12/2025
EA Investigated for AI-Generated Content in Battlefield 6
News

EA Investigated for AI-Generated Content in Battlefield 6

24/12/2025
Apple to Start iPhone 18 Production in January
News

Apple to Start iPhone 18 Production in January

24/12/2025
Please login to join discussion

Recent Posts

  • OpenAI Launches Customizable Skills for Codex Coding Agent
  • Amazon’s Alexa+ to Integrate with Four New Services
  • EA Investigated for AI-Generated Content in Battlefield 6
  • Apple to Start iPhone 18 Production in January
  • Connect Your Phone to Wi-Fi Easily

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals