30,000+ IPs Used by Hackers to Scan and Exploit Microsoft Remote Desktop Protocol (RDP) Services

add a heading (2)

A large-scale coordinated campaign has been detected targeting Microsoft Remote Desktop Protocol (RDP) services, where attackers deployed more than 30,000 unique IP addresses to probe for weaknesses in RD Web Access and RDP Web Client authentication portals.

Security analysts warn that this represents one of the largest RDP reconnaissance operations in recent years, suggesting that cybercriminals may be preparing for credential-focused attacks such as password spraying, credential stuffing, or ransomware deployment.

Key Highlights

  1. Over 30,000 IPs participated, marking the largest observed Microsoft RDP scanning operation.
  2. US schools were targeted during the back-to-school season, with username enumeration attempts.
  3. Intelligence analysis suggests an 80% likelihood of major exploits emerging soon.

Escalation of the Attack

The first wave of activity was recorded on August 21, 2025, involving nearly 2,000 IP addresses that probed both RD Web Access and RDP Web Client systems.

unnamed
Graph showing unique IP addresses observed probing Microsoft RD Web Access for authentication vulnerabilities over 90 days, highlighting increased suspicious activity

By August 24, the activity had intensified significantly, with more than 30,000 IPs launching synchronized probes. Researchers discovered identical client signatures across these sources, suggesting either a sophisticated botnet or a centralized toolset deployment.

unnamed (1)
Graph showing unique IP addresses observed conducting suspicious login enumeration checks against Microsoft RDP Web Client over the last 90 days.

Attack Methodology

Reports from GreyNoise confirm that the attackers relied on timing-based authentication enumeration. This method leverages minor server response time differences to determine whether a username is valid, without triggering standard brute-force defenses.

Such tactics enable adversaries to quietly compile lists of valid usernames, later used in credential stuffing or password spraying campaigns.

Telemetry analysis further revealed:

  • 92% of IPs involved had already been flagged as malicious.
  • 73% of the traffic originated from Brazil, yet exclusively targeted US-based RDP endpoints.
  • 1,851 out of 1,971 initial scanning hosts shared uniform client signatures, consistent with APT-style coordination.

Targeting the Education Sector

The timing aligns with the US back-to-school period, when universities and schools typically activate RDP-based labs and remote systems for students.

Attackers exploited the fact that educational networks often use predictable username formats (such as studentID or firstname.lastname), making them prime candidates for enumeration attacks.

The reconnaissance is being conducted in multiple stages:

  1. Identifying exposed RDP endpoints.
  2. Probing authentication processes for vulnerabilities.
  3. Collecting valid usernames and compiling target databases.

Broader Threat Landscape

Interestingly, the same infrastructure was also observed scanning for open proxy services and web crawling tasks, hinting at a multi-purpose toolkit for large-scale reconnaissance.

Historical data shows that such spikes in scanning activity often precede zero-day discovery or exploitation within six weeks, with an 80% correlation rate.

Experts warn that the scale and organization of this campaign could be a precursor to ransomware attacks, credential theft, or even new RDP zero-day exploitation.

Organizations using Microsoft RDP services are strongly advised to apply hardening measures immediately and monitor for client signature-based follow-up activity.