Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Large Botnet Targets US RDP Services Globally

Large Botnet Targets US RDP Services Globally

by Tekmono Editorial Team
14/10/2025
in News
Share on FacebookShare on Twitter

A large-scale campaign is targeting Remote Desktop Protocol (RDP) services in the United States, utilizing a botnet of more than 100,000 IP addresses. The activity began on October 8, and researchers at the threat monitoring platform GreyNoise believe the attacks originate from a multi-country botnet.

RDP is a network protocol that allows for remote connection and control of Windows systems, commonly used by system administrators, helpdesk staff, and remote employees. Attackers frequently scan for open RDP ports to conduct brute-force logins, exploit vulnerabilities, or perform other attacks.

GreyNoise researchers identified that the botnet employs two specific RDP-related attack methods. The first is an RD Web Access timing attack, where the botnet probes endpoints and measures differences in server response times during anonymous authentication to infer valid usernames. The second method is an RDP web client login enumeration, which interacts with the login process to identify user accounts by observing differing server behaviors and responses.

Related Reads

Apple Unveils iPhone 17e Starting at $599

Honor Launches Thinner Magic V6 Foldable Phone

Trump Orders Immediate Halt to Anthropic AI Use

Claude AI Suffers Partial Service Disruption on March 2

The campaign was first detected following an unusual spike in traffic originating from Brazil. Activity subsequently emerged from other countries, including Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to GreyNoise, the compromised devices that form the botnet are located in more than 100 countries.

A technical analysis revealed that nearly all of the attacking IP addresses share a common TCP fingerprint. Minor variations in the Maximum Segment Size are believed to be caused by different clusters within the botnet. To mitigate this threat, GreyNoise recommends that system administrators block the identified attacking IP addresses and review system logs for signs of suspicious RDP probing.

As a security best practice, organizations are advised not to expose RDP services directly to the public internet. Implementing a Virtual Private Network (VPN) and requiring multi-factor authentication (MFA) can provide additional layers of protection against such attacks.

ShareTweet

You Might Be Interested

Apple Unveils iPhone 17e Starting at 9
News

Apple Unveils iPhone 17e Starting at $599

02/03/2026
Honor Launches Thinner Magic V6 Foldable Phone
News

Honor Launches Thinner Magic V6 Foldable Phone

02/03/2026
Trump Orders Immediate Halt to Anthropic AI Use
News

Trump Orders Immediate Halt to Anthropic AI Use

02/03/2026
Claude AI Suffers Partial Service Disruption on March 2
News

Claude AI Suffers Partial Service Disruption on March 2

02/03/2026
Please login to join discussion

Recent Posts

  • Apple Unveils iPhone 17e Starting at $599
  • Honor Launches Thinner Magic V6 Foldable Phone
  • Trump Orders Immediate Halt to Anthropic AI Use
  • Claude AI Suffers Partial Service Disruption on March 2
  • Claude Chatbot Overtakes ChatGPT in US App Store

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals