Tekmono
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
No Result
View All Result
Tekmono
No Result
View All Result
Home News
Large Botnet Targets US RDP Services Globally

Large Botnet Targets US RDP Services Globally

by Tekmono Editorial Team
14/10/2025
in News
Share on FacebookShare on Twitter

A large-scale campaign is targeting Remote Desktop Protocol (RDP) services in the United States, utilizing a botnet of more than 100,000 IP addresses. The activity began on October 8, and researchers at the threat monitoring platform GreyNoise believe the attacks originate from a multi-country botnet.

RDP is a network protocol that allows for remote connection and control of Windows systems, commonly used by system administrators, helpdesk staff, and remote employees. Attackers frequently scan for open RDP ports to conduct brute-force logins, exploit vulnerabilities, or perform other attacks.

GreyNoise researchers identified that the botnet employs two specific RDP-related attack methods. The first is an RD Web Access timing attack, where the botnet probes endpoints and measures differences in server response times during anonymous authentication to infer valid usernames. The second method is an RDP web client login enumeration, which interacts with the login process to identify user accounts by observing differing server behaviors and responses.

Related Reads

Microsoft enhances Copilot with multimodal features, introduces new $99 tier

Apple celebrates 50th anniversary amid scrutiny over privacy practices

Huawei launches Converged Development Engine for HarmonyOS PCs

Salesforce unveils updated Slack with 30 new AI features

The campaign was first detected following an unusual spike in traffic originating from Brazil. Activity subsequently emerged from other countries, including Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to GreyNoise, the compromised devices that form the botnet are located in more than 100 countries.

A technical analysis revealed that nearly all of the attacking IP addresses share a common TCP fingerprint. Minor variations in the Maximum Segment Size are believed to be caused by different clusters within the botnet. To mitigate this threat, GreyNoise recommends that system administrators block the identified attacking IP addresses and review system logs for signs of suspicious RDP probing.

As a security best practice, organizations are advised not to expose RDP services directly to the public internet. Implementing a Virtual Private Network (VPN) and requiring multi-factor authentication (MFA) can provide additional layers of protection against such attacks.

ShareTweet

You Might Be Interested

Microsoft enhances Copilot with multimodal features, introduces new  tier
News

Microsoft enhances Copilot with multimodal features, introduces new $99 tier

02/04/2026
News

Apple celebrates 50th anniversary amid scrutiny over privacy practices

02/04/2026
News

Huawei launches Converged Development Engine for HarmonyOS PCs

02/04/2026
Salesforce unveils updated Slack with 30 new AI features
News

Salesforce unveils updated Slack with 30 new AI features

02/04/2026
Please login to join discussion

Recent Posts

  • Microsoft enhances Copilot with multimodal features, introduces new $99 tier
  • Apple celebrates 50th anniversary amid scrutiny over privacy practices
  • Huawei launches Converged Development Engine for HarmonyOS PCs
  • Salesforce unveils updated Slack with 30 new AI features
  • Meta announces release of second generation smart glasses starting April 14

Recent Comments

No comments to show.
  • News
  • Guides
  • Lists
  • Reviews
  • Deals
Tekmono is a Linkmedya brand. © 2015.

No Result
View All Result
  • News
  • Guides
  • Lists
  • Reviews
  • Deals