Massive Botnet of 100k+ IPs Targets U.S. RDP Services

Coordinated Botnet with Over 100,000 IPs Targets U.S. Remote Desktop Protocol (RDP) Services

HIGH
October 14, 2025
5m read
CyberattackThreat Intelligence

Related Entities

Organizations

Products & Tech

Full Report

Executive Summary

Security firm GreyNoise has observed a large-scale and coordinated attack campaign targeting Remote Desktop Protocol (RDP) services in the United States. Since October 8, 2025, a botnet comprising over 100,000 unique IP addresses spanning more than 100 countries has been actively scanning and attacking RDP endpoints. The attackers are not using simple brute-force methods but are employing more nuanced timing and enumeration attacks against RD Web Access and RDP web clients to discover valid usernames. The high level of coordination suggests a centrally controlled botnet. This activity represents a significant and active threat, as exposed and vulnerable RDP is a primary initial access vector for a wide range of threat actors, including ransomware groups.


Threat Overview

The campaign is characterized by a massive volume of traffic targeting TCP port 3389 (RDP) and associated web access ports (typically 443). The attackers' goal is to identify valid credentials without triggering standard brute-force detection mechanisms. The primary techniques observed are:

  • RD Web Access Timing Attacks: By measuring the server's response time to login attempts, attackers can sometimes distinguish between attempts with a valid username and those with an invalid one. This allows them to enumerate users without generating failed login events.
  • RDP Web Client Login Enumeration: Similar to timing attacks, attackers abuse features in RDP web clients that may respond differently to valid versus invalid usernames, allowing for credential enumeration.

GreyNoise assesses with high confidence that this is a coordinated botnet due to the simultaneous start of the activity from thousands of IPs and the similarity in their TCP fingerprints. The global distribution of the botnet nodes makes simple IP-based blocking challenging.


Technical Analysis

The botnet's activity falls under several MITRE ATT&CK techniques:

The use of enumeration and timing attacks is a step up from simple brute-forcing. It allows attackers to be stealthier and more efficient, building a list of valid usernames before attempting to guess passwords.


Impact Assessment

Exposed RDP is one of the most common and dangerous security misconfigurations. A successful compromise of an RDP account can lead to severe consequences:

  • Ransomware Deployment: Threat actors frequently use RDP access to manually deploy ransomware across a network.
  • Data Theft: Attackers can exfiltrate sensitive data from compromised systems and networks.
  • Persistent Access: An RDP foothold can be sold on dark web markets or used to install other forms of persistent backdoors.
  • Lateral Movement: Once inside, attackers can use the compromised system as a pivot point to move deeper into the network.

Given the scale of this botnet, any organization with RDP exposed to the internet is likely being targeted and is at high risk of compromise.


Detection & Response

  1. Monitor RDP Login Failures: While these attacks attempt to be stealthy, they will still generate failed login events once password guessing begins. Monitor Windows Security Event ID 4625 for a high volume of failures, especially across multiple accounts from a single source IP or for a single account from multiple IPs. Use D3FEND's D3-ANET: Authentication Event Thresholding.
  2. Network Traffic Analysis: Monitor for a large number of inbound connections to port 3389 from a wide range of geographically diverse IP addresses. Even if the connections don't result in a successful login, the pattern itself is an indicator of being targeted. Use D3FEND's D3-NTA: Network Traffic Analysis.
  3. Threat Intelligence: Leverage threat intelligence feeds, such as the one provided by GreyNoise, to proactively block IPs known to be part of this botnet campaign.

Mitigation

  1. Disable Internet-Facing RDP: The most effective mitigation is to ensure that RDP is not exposed directly to the internet. Access should be provided through a secure gateway, such as a VPN or a zero-trust network access (ZTNA) solution. This is a form of M1035 - Limit Access to Resource Over Network.
  2. Enforce Multi-Factor Authentication (MFA): MFA is a critical defense against credential-based attacks. Even if an attacker successfully guesses a password, they will be unable to log in without the second factor. This is the core of D3FEND's D3-MFA: Multi-factor Authentication.
  3. Strong Password Policies and Account Lockout: Enforce the use of long, complex passwords. Implement an account lockout policy that will temporarily disable an account after a certain number of failed login attempts to frustrate brute-force attacks. This aligns with D3FEND's D3-SPP: Strong Password Policy and D3-AL: Account Locking.
  4. Network Level Authentication (NLA): Enable NLA on all RDP connections. NLA requires a user to authenticate before a full RDP session is established, which is more resource-efficient and provides an earlier layer of protection.

Timeline of Events

1
October 8, 2025
The coordinated botnet activity targeting RDP services began.
2
October 14, 2025
This article was published

MITRE ATT&CK Mitigations

Enforce MFA on all RDP connections to prevent access even if credentials are compromised.

Mapped D3FEND Techniques:

Do not expose RDP directly to the internet. Place it behind a VPN or ZTNA gateway.

Mapped D3FEND Techniques:

Enforce strong, complex passwords and account lockout policies to frustrate brute-force attempts.

Mapped D3FEND Techniques:

Use firewalls to restrict RDP access to known, trusted IP addresses.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The single most effective defense against credential-based attacks targeting RDP is Multi-Factor Authentication. Even if the botnet successfully enumerates a valid username and guesses the correct password, MFA prevents the login from completing without the second factor (e.g., a code from an authenticator app, a push notification, or a hardware token). Organizations should deploy MFA on all remote access solutions, especially RDP gateways and VPNs. For direct RDP access, solutions like Duo or Microsoft's own Azure MFA with the NPS extension can add this critical layer of security. This moves the defense from trying to prevent password guessing to making a guessed password insufficient for access.

Organizations must eliminate the attack surface that this botnet is targeting. This means ensuring no RDP services (port 3389) are directly exposed to the public internet. All remote access should be brokered through a secure, hardened gateway like a VPN concentrator or a Zero Trust Network Access (ZTNA) solution. At the network perimeter, firewall rules should be configured to deny all unsolicited inbound traffic to port 3389. If specific partners or remote offices require RDP access, create explicit allow rules that restrict access to their known, static IP addresses. This simple act of filtering inbound traffic removes the organization from the botnet's list of potential targets.

Sources & References

Researchers warn of widespread RDP attacks by 100K-node botnet
Security Affairs (securityaffairs.com) October 14, 2025
GreyNoise Tracks Large-Scale Botnet Targeting RDP Services
GreyNoise (greynoise.io) October 14, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

BotnetRDPBrute ForceCredential StuffingCyberattack

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading