Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

GreyNoise researchers uncovered a botnet using over 100,000 IPs to attack RDP services in the U.S. starting October 8. The botnet uses timing and login enumeration attacks to identify valid Windows usernames.

byAytun Çelebi
October 14, 2025
in Cybersecurity, News

A multi-country botnet using over 100,000 IP addresses began targeting Remote Desktop Protocol services in the United States on October 8. Researchers at threat monitoring platform GreyNoise are tracking this large-scale campaign, which they believe is launched by the extensive botnet.

Remote Desktop Protocol (RDP) is a network protocol that enables remote connection to and control of Windows systems. It is commonly utilized by administrators, helpdesk staff, and remote workers. Attackers frequently target the protocol by scanning for open RDP ports, attempting brute-force logins, exploiting vulnerabilities, or performing timing attacks to gain unauthorized access.

For this campaign, GreyNoise researchers found the botnet employs two specific RDP-related attack techniques to enumerate user accounts. The methods include:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • RD Web Access timing attacks: These probes measure response-time differences during anonymous authentication flows on RD Web Access endpoints to infer valid usernames.
  • RDP web client login enumeration: This technique interacts with the RDP Web Client login flow, observing differences in server behavior and responses to identify user accounts.

GreyNoise first detected the campaign after observing an unusual traffic spike from Brazil. Similar activity was then registered from Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to the company, the full list of countries with compromised devices participating in the botnet now exceeds 100.

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities
Image: GreyNoise

A technical analysis revealed that nearly all attacking IP addresses share a common TCP fingerprint. Although researchers noted variations in the Maximum Segment Size, they believe these differences are due to the various clusters of compromised machines that constitute the botnet infrastructure.

To defend against this activity, system administrators are recommended to block the IP addresses launching the attacks and to review system logs for suspicious RDP probing. As a general security best practice, RDP services should not be exposed directly to the public internet. Adding a VPN and multi-factor authentication (MFA) provides an additional layer of protection.


Featured image credit

Tags: botnetgreynoise

Related Posts

Hackers exploit Cisco and Citrix zero days to gain admin access

Hackers exploit Cisco and Citrix zero days to gain admin access

November 13, 2025
Google adds advanced flow for sideloading Android apps

Google adds advanced flow for sideloading Android apps

November 13, 2025
Cash App rolls out Moneybot and expands crypto powered features

Cash App rolls out Moneybot and expands crypto powered features

November 13, 2025
10 no-logs VPN compared: 2025 review by SafePaper (Free vs. paid)

10 no-logs VPN compared: 2025 review by SafePaper (Free vs. paid)

November 13, 2025
AI video enhancer and watermark remover without quality loss

AI video enhancer and watermark remover without quality loss

November 13, 2025
GPT-5.1 debuts with new Instant and Thinking models

GPT-5.1 debuts with new Instant and Thinking models

November 13, 2025

LATEST NEWS

Hackers exploit Cisco and Citrix zero days to gain admin access

Google adds advanced flow for sideloading Android apps

Cash App rolls out Moneybot and expands crypto powered features

10 no-logs VPN compared: 2025 review by SafePaper (Free vs. paid)

AI video enhancer and watermark remover without quality loss

GPT-5.1 debuts with new Instant and Thinking models

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.