Raleigh, NC

32°F
Overcast Clouds Humidity: 90%
Wind: 5.14 M/S

Massive Botnet Uses 100,000 IPs to Target Remote Desktop Protocol Services in US

Massive Botnet Uses 100,000 IPs to Target Remote Desktop Protocol Services in US

A massive coordinated botnet campaign is currently targeting Remote Desktop Protocol (RDP) services across the United States. Security firm GreyNoise is tracking a significant wave of attacks originating from over 100,000 unique IP addresses spanning more than 100 countries. 

Coordinated Global Assault 

The sheer scale and organization of this operation indicate it is centrally controlled, with the explicit goal of compromising vulnerable RDP infrastructure essential for remote administration and work. The investigation began after analysts detected an anomalous spike in traffic from Brazilian IPs, which quickly expanded to include surges from Russia, China, Argentina, Mexico, Iran, South Africa, and dozens of other nations. 

Despite the diverse geographic origins, the attacks share a common target: US-based RDP services. Analysts are highly confident that this activity is the work of a single, large-scale botnet because nearly all participating IPs share an identical technical TCP fingerprint, suggesting a standardized, centralized command-and-control structure. 

Attack Techniques 

The threat actors are utilizing two specifics, synchronized attack vectors to efficiently identify and compromise systems without triggering immediate security alerts: 

  • RD Web Access Timing Attack: This sophisticated method measures the server's response time to login attempts to anonymously differentiate between valid and invalid usernames. 
  • RDP Web Client Login Enumeration: This systematically attempts to guess user credentials against identified RDP access points. 

Mitigation Steps 

In response to this ongoing threat, GreyNoise has provided urgent recommendations for network defenders. Organizations should proactively check their security logs for any unusual RDP probing or failed login attempts that match the campaign's patterns. 

For immediate protection, organizations must enforce strong security measures on RDP access, including: 

  • Enforcing strong password policies. 
  • Mandating multi-factor authentication (MFA) on all RDP services. 

GreyNoise has also released a dynamic blocklist template, named "microsoft-rdp-botnet-oct-25," allowing customers to automatically block all known malicious IP addresses at the network perimeter. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.