Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s

A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP addresses to probe for vulnerabilities in Microsoft RD Web Access and RDP Web Client authentication portals. 

The campaign represents one of the largest coordinated RDP reconnaissance operations observed in recent years, signaling potential preparation for large-scale credential-based attacks.

Key Takeaways
1. 30,000+ IPs attack, the largest recorded Microsoft RDP scanning campaign.
2. US schools hit during back-to-school season for username enumeration attacks.
3.  80% chance of major exploits.

Remote Desktop Protocol Attack Campaign

The scanning operation began with an initial wave on August 21, 2025, involving nearly 2,000 IP addresses simultaneously targeting both Microsoft RD Web Access and Microsoft RDP Web Client services. 

Google News

Targeting Microsoft RDP Web Access
Graph showing unique IP addresses observed probing Microsoft RD Web Access for authentication vulnerabilities over 90 days, highlighting increased suspicious activity.

However, the campaign escalated dramatically on August 24, when security researchers detected over 30,000 unique IP addresses conducting coordinated probes using identical client signatures, indicating a sophisticated botnet infrastructure or coordinated toolset deployment.

Targeting Microsoft RDP Web Client
Graph showing unique IP addresses observed conducting suspicious login enumeration checks against Microsoft RDP Web Client over the last 90 days.

GreyNoise reports that the attack methodology focuses on timing-based authentication enumeration, a technique that exploits subtle differences in server response times to identify valid usernames without triggering traditional brute-force detection mechanisms. 

This approach allows attackers to build comprehensive target lists for subsequent credential stuffing and password spraying operations while maintaining operational stealth.

Network telemetry analysis reveals that 92% of the scanning infrastructure consists of previously classified malicious IP addresses, with source traffic heavily concentrated in Brazil (73% of observed sources) while exclusively targeting United States-based RDP endpoints. 

The uniform client signature patterns across 1,851 of the 1,971 initial scanning hosts suggest a centralized command and control infrastructure typical of advanced persistent threat (APT) operations.

Targeting the Educational Sector 

The campaign’s timing coincides with the United States’ back-to-school period, when educational institutions typically deploy RDP-enabled laboratory environments and remote access systems for incoming students. 

This targeting window is strategically significant, as educational networks often implement predictable username schemas (student IDs, firstname.lastname formats) that facilitate enumeration attacks.

The threat actors are conducting multi-stage reconnaissance operations, first identifying exposed RD Web Access and RDP Web Client endpoints, then testing authentication workflows for information disclosure vulnerabilities. 

This systematic approach enables the creation of comprehensive target databases containing valid usernames and accessible endpoints for future exploitation campaigns.

Security researchers note that the same IP infrastructure has been observed conducting parallel scanning for open proxy services and web crawling operations, indicating a multipurpose threat toolkit designed for comprehensive network reconnaissance. 

Historical analysis suggests that coordinated scanning spikes against specific technologies often precede the discovery or exploitation of zero-day vulnerabilities within six weeks, based on 80% correlation rates in previous threat intelligence research.

The scale and coordination of this RDP scanning campaign represent a significant escalation in threat actor capabilities, potentially indicating preparation for large-scale ransomware deployment, credential harvesting operations, or the exploitation of previously unknown RDP vulnerabilities. 

Organizations operating Microsoft RDP services should implement immediate hardening measures and monitor for follow-up exploitation attempts using the identified client signatures.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.