Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses

By Published On: October 13, 2025

Remote Desktop Protocol (RDP) stands as a foundational technology for remote access, enabling businesses and individuals to maintain operational continuity regardless of physical location. However, its widespread adoption also makes it a prime target for malicious actors. A recent report from security firm GreyNoise highlights a significant and concerning trend: a coordinated botnet campaign actively targeting RDP services across the United States, originating from an astonishing 100,000+ unique IP addresses. This campaign underscores the persistent and evolving threat landscape facing RDP deployments globally.

Understanding the RDP Attack Wave

On October 8, 2025, GreyNoise reported tracking a massive wave of attacks targeting RDP services. This surge in malicious activity is notable not only for its scale but also for its apparent coordination. With origins traced to over 100,000 distinct IP addresses spanning more than 100 countries, the operation suggests a centrally controlled botnet infrastructure. Such a distributed attack surface makes attribution and mitigation particularly challenging, presenting a significant hurdle for cybersecurity defenses.

The primary objective of these attacks is likely to gain unauthorized access to systems. Once successful, attackers can engage in various malicious activities, including data exfiltration, ransomware deployment, or using compromised systems as launchpads for further attacks. The sheer number of originating IP addresses indicates a brute-force approach, systematically attempting to guess credentials or exploit known RDP vulnerabilities.

The Pervasive Threat of RDP Exploitation

RDP remains a high-value target for several reasons. Many organizations, especially small and medium-sized businesses, may not implement robust security measures around their RDP deployments. Default configurations, weak passwords, and unpatched vulnerabilities create significant entry points for attackers. This sustained RDP attack wave serves as a stark reminder of the critical importance of a layered security approach to protect these essential services.

While the specific vulnerabilities being exploited in this current campaign were not explicitly detailed in the report, historical RDP vulnerabilities like BlueKeep (CVE-2019-0708) and recent critical flaws underscore the continuous need for vigilance. For instance, CVE-2019-0708 allowed unauthenticated remote code execution, demonstrating the severe impact of unpatched RDP services. Similarly, other vulnerabilities such as CVE-2023-21798 (Windows RDP Remote Code Execution Vulnerability) or CVE-2023-35639 (Windows RDP Security Feature Bypass Vulnerability), while not necessarily part of this specific campaign, highlight the ongoing efforts by threat actors to find and exploit weaknesses in RDP.

Remediation Actions for Securing RDP Services

Protecting RDP services requires a proactive and multi-faceted strategy. Given the scale of the current attacks, immediate action is crucial.

  • Strong, Unique Passwords: Enforce strong password policies for all RDP accounts. Mandate complex passwords that combine uppercase and lowercase letters, numbers, and symbols, and require regular changes.
  • Multi-Factor Authentication (MFA): Implement MFA for all RDP access. This adds a critical layer of security, as even if an attacker compromises credentials, they cannot gain access without the second factor.
  • Network Level Authentication (NLA): Enable NLA for RDP connections. NLA requires users to authenticate before a full RDP session is established, reducing the risk of unauthorized access attempts reaching the full RDP stack.
  • Restrict RDP Access to Trusted IPs: Limit RDP access to only specific, trusted IP addresses using firewall rules. Avoid exposing RDP directly to the internet; instead, use a VPN for secure remote access.
  • Regular Patching and Updates: Keep all operating systems and RDP software patched and up-to-date. Apply security updates promptly to address known vulnerabilities like those associated with CVE-2019-0708.
  • Account Lockout Policies: Configure account lockout policies to prevent brute-force attacks. After a certain number of failed login attempts, the account should be temporarily locked.
  • Monitor RDP Logs: Regularly review RDP event logs for suspicious activity, such as multiple failed login attempts or access from unusual geographic locations. Automated monitoring and alerting tools can be highly effective.
  • Rename Default RDP Port: While not a security measure in itself, changing the default RDP port (3389) can reduce the volume of automated scanning and attacks targeting the default port. This is a measure of obscurity, not security, and should be combined with other robust controls.
  • Security Audits: Conduct regular security audits and penetration tests of RDP configurations to identify and remediate weaknesses.

Tools for RDP Security and Monitoring

Leveraging the right tools can significantly enhance the security posture of RDP services. Here’s a selection of useful tools:

Tool Name Purpose Link
Microsoft Defender for Endpoint Endpoint detection and response (EDR), including RDP anomaly detection. https://www.microsoft.com/en-us/security/business/threat-protection/microsoft-defender-for-endpoint
Nmap Network scanner for identifying open RDP ports and services. https://nmap.org/
Wireshark Network protocol analyzer for deep packet inspection of RDP traffic. https://www.wireshark.org/
Fail2Ban Intrusion prevention framework that can dynamically block IP addresses after multiple failed login attempts. https://www.fail2ban.org/wiki/index.php/Main_Page
Event Log Explorer Advanced event log viewer and analyzer for Windows, useful for RDP log monitoring. https://www.eventlogxp.com/
CyberArk (PAM Solutions) Privileged Access Management (PAM) for securing, managing, and monitoring RDP access for privileged accounts. https://www.cyberark.com/products/privileged-access-management/core-pas/

Conclusion

The ongoing, large-scale botnet attacks against RDP services are a critical reminder of the constant threats facing remote access technologies. The pervasive nature of these attacks, originating from over 100,000 IP addresses globally, necessitates immediate and proactive security measures. Implementing strong authentication, restricting access, diligent patching, and continuous monitoring are not merely best practices; they are essential defenses against sophisticated and coordinated cyber assaults targeting critical infrastructure. Organizations must prioritize the security of their RDP deployments to avoid becoming another statistic in the ever-growing list of cyberattack victims.

Share this article

Leave A Comment