Hackers Actively Scan Microsoft Remote Desktop Web Access from 1,000+ IPs

On August 21, GreyNoise Intelligence detected an unprecedented surge in Remote Desktop Protocol (RDP) reconnaissance activity, as 1,971 unique IP addresses—nearly 400 times the baseline—simultaneously probed both Microsoft RD Web Access and Microsoft RDP Web Client authentication portals.

The uniformity of the client signature and the timing-based enumeration techniques strongly indicate a coordinated campaign designed to discover valid usernames ahead of credential-based intrusions.

Within this spike, 1,851 of the 1,971 IPs shared the same client signature, pointing to a single toolkit or botnet module powering the activity.

Approximately 92 percent of those IPs were already tagged as malicious by GreyNoise, suggesting the infrastructure behind the scanning had been active in other threat operations.

Source analysis revealed that roughly 73 percent of the scanning originated from Brazil, with the United States as the sole target.

Table: Key Metrics of the August 21 Surge

MetricValue
Baseline daily IP count3–5
IPs observed on August 211,971
Overlap across both RDP tags100%
IPs sharing uniform client signature1,851 (94%)
Previously tagged malicious IPs1,698 (92% of uniform signature IPs)
Primary source countryBrazil (~73%)
Target countryUnited States

Late on August 24, GreyNoise identified a follow-on wave exceeding 30,000 unique IPs triggering the same RDP tags from the identical client signature, signaling a dramatic escalation in scope.

This broader wave underscores the attackers’ intent to map exposed RDP endpoints en masse and harvest valid account names through timing-based side channels.

The surge occurs amid the U.S. back-to-school window, when educational institutions bring hundreds of remote labs and RDP-backed environments online.

Predictable username schemes—student IDs and firstname. lastname formats—combined with under-resourced IT teams create a fertile landscape for enumeration attacks.

By confirming valid usernames, adversaries dramatically improve the efficiency of follow-on credential stuffing, password spraying, and brute-force efforts.

RDP enumeration precedes critical exploitation events. Historical examples include the BlueKeep (CVE-2019-0708) campaign, which moved from scanning to widespread exploitation within weeks, as well as documented RDP abuse by espionage actors and ransomware groups such as SamSam.

Research shows that 80 percent of new vulnerabilities are disclosed within six weeks of a spike in scanning activity, highlighting the urgency for defenders to act.

Organizations with exposed RD Web Access and RDP Web Client portals should immediately review and harden authentication workflows.

Mitigations include enforcing multi-factor authentication, limiting access to known IP ranges, enabling account lockout thresholds, and monitoring for unusual timing-based anomalies.

GreyNoise continues to track this activity and will update its dynamic IP blocklist service to help security teams respond faster to emerging threats.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here