Massive Global Botnet Targets U.S. RDP Services: Experts Advise Urgent Security Measures
October 14, 2025
A coordinated attack campaign is underway, utilizing specific vectors such as RD Web Access timing attacks and RDP web client login enumeration, indicating control by a single entity.
Researchers from GreyNoise have identified a large-scale botnet comprising over 100,000 IP addresses from more than 100 countries, actively targeting RDP services in the United States since early October 2025.
The source countries for these attacks include Brazil, Argentina, Iran, China, Mexico, Russia, South Africa, and Ecuador, underscoring the global reach of this threat.
Most attacking IPs share a similar TCP fingerprint, which suggests centralized control and confirms that the activity originates from a single botnet despite its wide geographical distribution.
To defend RDP services, experts recommend using VPNs or firewalls to restrict access, enforcing multi-factor authentication and strong passwords, enabling Network Level Authentication, and keeping systems patched.
Additional security measures include monitoring login attempts for anomalies, employing tools like EDR or fail2ban to block brute-force attacks, and limiting RDP exposure to essential, time-bound access.
GreyNoise assesses with high confidence that this activity is orchestrated by a single botnet, based on shared TCP fingerprint characteristics, timing patterns, and attack vectors.
Summary based on 1 source
Get a daily email with more Tech stories
Source

Security Affairs • Oct 14, 2025
Researchers warn of widespread RDP attacks by 100K-node botnet