Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

GreyNoise researchers uncovered a botnet using over 100,000 IPs to attack RDP services in the U.S. starting October 8. The botnet uses timing and login enumeration attacks to identify valid Windows usernames.

byAytun Çelebi
October 14, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A multi-country botnet using over 100,000 IP addresses began targeting Remote Desktop Protocol services in the United States on October 8. Researchers at threat monitoring platform GreyNoise are tracking this large-scale campaign, which they believe is launched by the extensive botnet.

Remote Desktop Protocol (RDP) is a network protocol that enables remote connection to and control of Windows systems. It is commonly utilized by administrators, helpdesk staff, and remote workers. Attackers frequently target the protocol by scanning for open RDP ports, attempting brute-force logins, exploiting vulnerabilities, or performing timing attacks to gain unauthorized access.

For this campaign, GreyNoise researchers found the botnet employs two specific RDP-related attack techniques to enumerate user accounts. The methods include:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • RD Web Access timing attacks: These probes measure response-time differences during anonymous authentication flows on RD Web Access endpoints to infer valid usernames.
  • RDP web client login enumeration: This technique interacts with the RDP Web Client login flow, observing differences in server behavior and responses to identify user accounts.

GreyNoise first detected the campaign after observing an unusual traffic spike from Brazil. Similar activity was then registered from Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to the company, the full list of countries with compromised devices participating in the botnet now exceeds 100.

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities
Image: GreyNoise

A technical analysis revealed that nearly all attacking IP addresses share a common TCP fingerprint. Although researchers noted variations in the Maximum Segment Size, they believe these differences are due to the various clusters of compromised machines that constitute the botnet infrastructure.

To defend against this activity, system administrators are recommended to block the IP addresses launching the attacks and to review system logs for suspicious RDP probing. As a general security best practice, RDP services should not be exposed directly to the public internet. Adding a VPN and multi-factor authentication (MFA) provides an additional layer of protection.


Featured image credit

Tags: botnetgreynoise

Related Posts

Spotify Wrapped 2025: More layers, stories and connection than ever before

Spotify Wrapped 2025: More layers, stories and connection than ever before

December 3, 2025
Your next Android call might tell you exactly why it is urgent

Your next Android call might tell you exactly why it is urgent

December 3, 2025
Your Android 16 phone gets a dark mode that works on every app

Your Android 16 phone gets a dark mode that works on every app

December 3, 2025
Raspberry Pi just got up to  more expensive

Raspberry Pi just got up to $25 more expensive

December 3, 2025
Users are mad about app suggestions in the highly priced ChatGPT Pro Plan

Users are mad about app suggestions in the highly priced ChatGPT Pro Plan

December 3, 2025
Red Dead Redemption is now available on Netflix Games mobile

Red Dead Redemption is now available on Netflix Games mobile

December 3, 2025

LATEST NEWS

Spotify Wrapped 2025: More layers, stories and connection than ever before

Your next Android call might tell you exactly why it is urgent

Your Android 16 phone gets a dark mode that works on every app

Raspberry Pi just got up to $25 more expensive

Users are mad about app suggestions in the highly priced ChatGPT Pro Plan

Red Dead Redemption is now available on Netflix Games mobile

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.