Massive RDP Attack Wave: Analyzing the 100,000-Plus IP Botnet Targeting Remote Desktop Protocol Services

CYBERDDUEBIVASH

Author: CyberDudeBivash — cyberbivash.blogspot.com | Published: Oct 11, 2025 — Updated:

TL;DR

  • A coordinated botnet of **100,000+ unique IP addresses** has been observed targeting Microsoft Remote Desktop (RDP) services — the operation appears global and focused on authentication endpoints. 
  • Observed tactics include mass probing, timing-based username enumeration against RD Web Access, and credential-stuffing/brute-force follow-ups — this behavior scales risk for ransomware and account takeover.
  • Immediate actions: block/limit RDP exposure, enforce MFA & passkeys, deploy behavioral EDR detection for credential harvesters, and run the SIEM hunts below now. 

What we know

Security telemetry vendors first observed a major surge in RDP-targeting activity starting on October 8, 2025. GreyNoise reports the campaign involves over 100,000 unique IPs across more than 100 countries, with many participants sharing a common TCP fingerprint and focusing on RD Web Access and RDP Web Client authentication endpoints. Independent reporting confirms broad, coordinated scanning followed by credential-focused attacks.


Why this matters — attack intent & impact

  • Mass scale equals mass impact: a 100k-IP botnet can probe millions of endpoints quickly — increasing the chance of finding exposed or weakly protected RDP ports.
  • Credential harvesting → ransomware: successful RDP compromises are a common initial access vector for ransomware and data exfiltration operations.
  • Timing & enumeration tricks: attackers are using timing-based checks and RD Web Access quirks to enumerate valid usernames before attempting password-based takeover — reducing noisy failures and improving success rates. 

Immediate actions (do these now)

  1. Block RDP at the perimeter: remove direct internet exposure — place RDP behind VPN, remote-access gateway, or Zero Trust broker.
  2. Enforce MFA / passkeys & conditional access: require strong second factors (passkeys or FIDO2 where possible) for all RDP access and admin accounts. Password-only RDP is high risk. 
  3. Network controls: block known bad IP ranges, rate-limit RDP ports, and apply geo / ASN restrictions if appropriate for your org.
  4. Harden RD Web / NLA: enable Network Level Authentication (NLA) and patch RD Web / RD Gateway servers; enforce account lockout or progressive throttling for repeated failures.
  5. EDR & session logging: enable endpoint detection to catch credential-stealing binaries and process chains that access browser profiles; log and retain RDP session activity and broker logs for forensic analysis.
  6. Rotate & audit privileged credentials: rotate passwords/service accounts and audit where shared credentials exist; adopt short-lived credentials for automation.

SOC / SIEM hunts — run these immediately 

Tune thresholds to your environment. These hunts are defensive and aimed at early detection of large-scale probing, username enumeration, and credential stuffing.


# Splunk — high-rate RDP connection attempts (filter by RDP ports 3389, 443 if RD Web)
index=network OR index=firewall dest_port IN (3389,443) action=blocked OR action=allowed
| stats count by src_ip, dest_ip, dest_port, signature
| where count > 200


# Splunk — username enumeration / RD Web timing anomalies (example)
index=web sourcetype="iis*"
| where cs_method="POST" and cs_uri_stem contains "/rdweb" or cs_uri_stem contains "login"
| stats avg(response_time) as avg_rt, count by cs_username, src_ip
| where avg_rt < 0.05 AND count > 50


# Elastic/EQL — many auth failures followed by success (credential stuffing pattern)
events
| where event.type == "authentication" and event.outcome in ("failure","success")
| transaction user.name maxspan=15m
| where event.count(failure) > 50 and event.count(success) > 0
| stats count by user.name, client.ip


# Generic — detect many distinct destination ports probed from same src (scanning tool)
index=netflow
| stats dc(dest_ip) as dst_count, dc(dest_port) as port_count by src_ip
| where dst_count > 100 and port_count > 5


Copy-paste detection signatures


# Sigma — high-rate RDP connection attempts (example)
title: Suspicious high-rate RDP connection attempts
logsource:
  product: firewall
detection:
  selection:
    dest_port: 3389
    event_count: '>200'
  condition: selection
level: high


# YARA — defensive rule to detect known infostealer or brute tool strings in memory or on disk
rule Possible_RDP_Tooling
{
  meta:
    author = "CyberDudeBivash"
    date = "2025-10-11"
  strings:
    $s1 = "rdp" ascii nocase
    $s2 = "mstsc" ascii nocase
    $s3 = "credential" ascii nocase
    $s4 = "login" ascii nocase
  condition:
    any of ($s*)
}


MITRE ATT&CK mapping (quick)

TacticTechniqueNotes
ReconnaissanceT1595 (Active Scanning)Mass RDP scanning and probing RD Web endpoints.
Initial AccessT1078 (Valid Accounts) / T1110 (Brute Force)Credential stuffing and brute-force using harvested or weak passwords.
Exfiltration / ImpactT1486 (Data Encrypted for Impact)Ransomware pivot after initial access via RDP.

Intelligence & attacker tooling notes

Researchers note attackers increasingly combine timing-based username enumeration on RD Web portals with distributed credential stuffing to reduce noise and increase account-takeover success. Password lists used in live RDP attacks remain predictable — defenders should prioritize blocking the most common weak passwords and analyzing password spray trends in their environments. 


Recommended controls & remediation checklist

  • Remove direct internet-facing RDP. Use VPNs, Bastion/Jump hosts, or Zero Trust network access (ZTNA).
  • Require MFA/FIDO2 for all remote access; block legacy fallback methods.
  • Harden RD Gateway / RD Web: patch, enable NLA, and disable legacy protocols/features that leak timing differences.
  • Implement network-level rate-limits and RDP connection throttling at firewall/load-balancer.
  • Monitor & block attacker IPs using threat intel; but assume IP churn — focus on behavior-based detections. 
  • Prepare IR runbooks for RDP compromise (isolate host, memory capture, credential rotation, rebuild if needed).

Advice for small businesses and admins

  1. Turn off RDP if you don’t need it. If you need RDP, put it behind a VPN with MFA.
  2. Use strong, unique passwords + a password manager — block common passwords at authentication gateways where possible. 
  3. Keep systems patched and enable EDR that detects credential-stealing and suspicious process chains.

Sources & further reading

  • GreyNoise analysis: 100,000+ IP botnet targeting RDP services (primary telemetry & writeup). 
  • Industry coverage & breaking reporting summarizing the wave and observed tactics. 
  • DarkReading / research writeups on RDP probing and timing-enumeration techniques. 
  • Specops research on passwords observed being used against RDP services — helps prioritize blocklists.
  • SentinelOne guidance on preventing RDP attacks and hardening posture. 

Product & service picks — quick (affiliate cards)

Kaspersky Endpoint Security

EDR detection and rollback to stop credential harvesters and post-exploit tooling.Protect with Kaspersky

Edureka — Training for IT & SOC teams

Upskill staff on remote-access hardening, detection, and incident response playbooks.Train SOC teams (Edureka)

TurboVPN — Secure remote connectivity

Use for secure admin connections and remote vendor sessions; pair with MFA and strong access controls.Get TurboVPN


Explore the CyberDudeBivash Ecosystem

Our Core Services:

  • CISO Advisory & Strategic Consulting
  • Penetration Testing & Red Teaming
  • Digital Forensics & Incident Response (DFIR)
  • Advanced Malware & Threat Analysis
  • Supply Chain & DevSecOps Audits

Follow Our Main Blog for Daily Threat IntelVisit Our Official Site & Portfolio


Hashtags:

#CyberDudeBivash #RDP #Botnet #CredentialStuffing #ThreatIntel #IR #SecurityOps

Leave a comment

Design a site like this with WordPress.com
Get started