Botnet Mayhem: RDP Attacks Surge from 100,000 IPs—Is Your System Next?
A botnet is targeting Remote Desktop Protocol services in the US from over 100,000 IP addresses. Researchers believe this multi-country botnet is launching RD Web Access timing attacks and RDP web client login enumeration. To thwart these antics, admins should block malicious IPs and avoid exposing remote desktop connections to the public internet.

Hot Take:
Ah, the botnet – a classic example of the ‘gift’ that keeps on giving… headaches. With more than 100,000 IP addresses flexing their muscles, it’s like the botnet equivalent of a world tour, visiting countries you’d rather not have on your cybersecurity itinerary. The real surprise here? It’s not a rock band trying to sell out stadiums, but a pesky botnet turning RDP services into their personal stage. Bravo?
Key Points:
- Over 100,000 IP addresses are launching attacks on RDP services in the US.
- The attacks are orchestrated by a multi-country botnet.
- Two main attack vectors include RD Web Access timing attacks and RDP web client login enumeration.
- Countries involved include Brazil, Iran, China, Russia, and more.
- Advised defenses include IP blocking, VPN usage, and multi-factor authentication.
