Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses

Cybersecurity

On October 8, 2025, security firm GreyNoise reported a substantial botnet campaign targeting Remote Desktop Protocol (RDP) services in the United States. The attack involves over 100,000 unique IP addresses from more than 100 countries, aiming to compromise RDP infrastructure, which is critical for remote work and administration.

Attack Overview

The coordinated nature of this campaign poses a significant threat to organizations relying on RDP for daily operations. The investigation began following an anomalous spike in traffic from Brazilian IPs, leading to the discovery of similar activities from Argentina, Iran, China, Mexico, Russia, and South Africa. Despite the geographic diversity, the common target remains RDP services within the United States.

Analysts attribute this activity to a single, large-scale botnet, based on similar TCP fingerprints across participating IPs. This suggests a centralized command-and-control structure orchestrating the attacks.

Attack Vectors

The attackers utilize two specific methods:

Mitigations

In response, GreyNoise recommends that network defenders monitor their security logs for unusual RDP probing or failed login attempts matching the campaign’s patterns. Additionally, a dynamic blocklist template, “microsoft-rdp-botnet-oct-25,” is available for automatic blocking of known malicious IPs.

Organizations are advised to enforce strong password policies and implement multi-factor authentication to protect against brute-force attacks. Regularly reviewing RDP security settings is also recommended to enhance protection.

Exit mobile version