Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities

GreyNoise researchers uncovered a botnet using over 100,000 IPs to attack RDP services in the U.S. starting October 8. The botnet uses timing and login enumeration attacks to identify valid Windows usernames.

byAytun Çelebi
October 14, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

A multi-country botnet using over 100,000 IP addresses began targeting Remote Desktop Protocol services in the United States on October 8. Researchers at threat monitoring platform GreyNoise are tracking this large-scale campaign, which they believe is launched by the extensive botnet.

Remote Desktop Protocol (RDP) is a network protocol that enables remote connection to and control of Windows systems. It is commonly utilized by administrators, helpdesk staff, and remote workers. Attackers frequently target the protocol by scanning for open RDP ports, attempting brute-force logins, exploiting vulnerabilities, or performing timing attacks to gain unauthorized access.

For this campaign, GreyNoise researchers found the botnet employs two specific RDP-related attack techniques to enumerate user accounts. The methods include:

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

  • RD Web Access timing attacks: These probes measure response-time differences during anonymous authentication flows on RD Web Access endpoints to infer valid usernames.
  • RDP web client login enumeration: This technique interacts with the RDP Web Client login flow, observing differences in server behavior and responses to identify user accounts.

GreyNoise first detected the campaign after observing an unusual traffic spike from Brazil. Similar activity was then registered from Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador. According to the company, the full list of countries with compromised devices participating in the botnet now exceeds 100.

Researchers warn of 100K-node botnet exploiting Remote Desktop vulnerabilities
Image: GreyNoise

A technical analysis revealed that nearly all attacking IP addresses share a common TCP fingerprint. Although researchers noted variations in the Maximum Segment Size, they believe these differences are due to the various clusters of compromised machines that constitute the botnet infrastructure.

To defend against this activity, system administrators are recommended to block the IP addresses launching the attacks and to review system logs for suspicious RDP probing. As a general security best practice, RDP services should not be exposed directly to the public internet. Adding a VPN and multi-factor authentication (MFA) provides an additional layer of protection.


Featured image credit

Tags: botnetgreynoise

Related Posts

Blue Origin sets late February launch for third New Glenn mission

Blue Origin sets late February launch for third New Glenn mission

January 22, 2026
Anthropic overhauls hiring tests due to Claude AI

Anthropic overhauls hiring tests due to Claude AI

January 22, 2026
NexPhone launches triple OS phone for 9

NexPhone launches triple OS phone for $549

January 22, 2026
Google Photos redesigns sharing with immersive full-screen carousel

Google Photos redesigns sharing with immersive full-screen carousel

January 22, 2026
Snap rolls out granular screen time tracking in Family Center update

Snap rolls out granular screen time tracking in Family Center update

January 22, 2026
Spotify launches AI-powered Prompted Playlists

Spotify launches AI-powered Prompted Playlists

January 22, 2026

LATEST NEWS

Blue Origin sets late February launch for third New Glenn mission

Anthropic overhauls hiring tests due to Claude AI

NexPhone launches triple OS phone for $549

Google Photos redesigns sharing with immersive full-screen carousel

Snap rolls out granular screen time tracking in Family Center update

Spotify launches AI-powered Prompted Playlists

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.