A computer monitor with a Remote Desktop Protocol (RDP) icon in front, on a blue background. The text at the bottom reads, RDP Services Under Attack!!.

Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily

By Published On: October 21, 2025

Microsoft’s Remote Desktop Protocol (RDP) is a cornerstone for remote work and system administration, offering seamless access to computing resources from virtually anywhere. However, this convenience comes with inherent security risks. A persistent and highly coordinated campaign is currently exploiting RDP services, leveraging a massive scale of new IP addresses daily. This isn’t just another background noise of internet attacks; it’s a sophisticated, persistent threat that demands immediate attention from security professionals and IT teams.

The Escalating Threat to RDP Services

Recent intelligence highlights a concerning trend: attackers are deploying over 30,000 new IP addresses daily to target Microsoft RDP services. This aggressive tactic is designed to bypass traditional IP-based blocking mechanisms and sustain a high volume of attack attempts. The sheer scale is indicative of a well-resourced and organized effort, likely orchestrated by a global botnet. Since September 2025, the unique IP addresses involved in these attacks have surged past 500,000, underscoring the widespread nature of this threat, with a particular focus on U.S.-based systems.

The primary attack vectors identified in this campaign include RD Web, a component often used for simplified RDP access through a web browser. These attacks are not merely brute-force attempts; they are exploiting “timing-based vulnerabilities.” This suggests a more nuanced approach than simple credential stuffing, where attackers might be analyzing response times to glean information or bypass security controls. While specific CVEs linked to these timing vulnerabilities were not explicitly stated in the source, organizations should remain vigilant for any RDP-related vulnerabilities, particularly those that could be abused for information leakage or authentication bypass.

Understanding Timing-Based Vulnerabilities in RDP

Timing-based vulnerabilities can manifest in various ways within a protocol like RDP. Rather than directly exploiting a flaw in the code, attackers observe the time it takes for a server to respond to different types of requests. For example, a server might take slightly longer to respond to an incorrect password attempt that shares common characters with the correct password, or a different amount of time to process a valid versus an invalid username. These subtle differences, when observed across tens of thousands of attempts, can be used to infer information about credentials, validate usernames, or even bypass multi-factor authentication if not properly implemented.

The constant rotation of over 30,000 new IP addresses per day makes defending against these attacks particularly challenging. Traditional blacklisting of malicious IPs becomes an exercise in futility, as new attack origins emerge constantly. This necessitates a shift towards more proactive and adaptive security measures.

Remediation Actions and Proactive Defense

Given the persistent nature and scale of these RDP attacks, organizations must implement robust security practices to protect their RDP services. Relying solely on basic password policies is insufficient.

  • Implement Multi-Factor Authentication (MFA): This is the most crucial step. Even if attackers obtain RDP credentials, MFA acts as a critical second line of defense, preventing unauthorized access.
  • Restrict RDP Access: Limit RDP access to only trusted IP addresses or through a Virtual Private Network (VPN). RDP ports (typically 3389) should not be directly exposed to the internet.
  • Network Level Authentication (NLA): Enable NLA for RDP connections. NLA requires users to authenticate before a full RDP session is established, adding an extra layer of security and mitigating some pre-authentication vulnerabilities.
  • Strong Password Policies and Account Lockout: Enforce strong, complex passwords and implement aggressive account lockout policies to deter brute-force attacks.
  • Regular Patching and Updates: Ensure all RDP components and the underlying operating system are kept up-to-date with the latest security patches. This includes security updates for vulnerabilities like CVE-2019-0708 (BlueKeep) and other critical RDP vulnerabilities as they emerge.
  • Intrusion Detection/Prevention Systems (IDS/IPS): Deploy IDS/IPS solutions capable of detecting and blocking suspicious RDP traffic patterns, including high volumes of failed login attempts or unusual connection behaviors.
  • Monitor RDP Logs: Regularly review security event logs for RDP activity, looking for failed login attempts, unusual connection times, or connections from unexpected geographic locations.
  • Geofencing: If your organization operates within a specific geographic region, consider implementing geofencing to restrict RDP access to those locations.

Tools for RDP Security Enhancements

A range of tools can assist in bolstering RDP security. Here’s a brief overview:

Tool Name Purpose Link
Duo Security Multi-Factor Authentication (MFA) for RDP and other services. https://duo.com/
Microsoft Defender for Identity Detects advanced multi-stage attacks, including RDP brute force attempts. https://www.microsoft.com/en-us/security/business/identity/microsoft-defender-for-identity
Nmap (Network Mapper) Network discovery and security auditing, including RDP port scanning. https://nmap.org/
RD Gateway (Windows Server) Provides a secure, encrypted connection to RDP resources. https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/rds-rd-gateway-client-support

Conclusion

The continuous assault on RDP services, characterized by the daily deployment of tens of thousands of new IP addresses and the exploitation of timing-based vulnerabilities, represents a significant and evolving threat. Organizations relying on RDP must transcend conventional security approaches and adopt a multi-layered defense strategy. Implementing MFA, restricting access, enabling NLA, maintaining stringent patching policies, and leveraging advanced threat detection tools are no longer optional but essential safeguards against a determined and adaptive adversary. Proactive vigilance and continuous adaptation are key to securing RDP in this heightened threat landscape.

Share this article

Leave A Comment