Original Article Text

Click to Toggle View

Surge in coordinated scans targets Microsoft RDP auth servers. Internet intelligence firm GreyNoise reports that it has recorded a significant spike in scanning activity consisting of nearly 1,971 IP addresses probing Microsoft Remote Desktop Web Access and RDP Web Client authentication portals in unison, suggesting a coordinated reconnaissance campaign. The researchers say that this is a massive change in activity, with the company usually only seeing 3–5 IP addresses a day performing this type of scanning. GreyNoise says that the wave in scans is testing for timing flaws that could be used to verify usernames, setting up future credential-based attacks, such as brute force or password-spray attacks. Timing flaws occur when the response time of a system or request unintentionally reveals sensitive information. In this case, a slight timing difference in how quickly RDP responds to login attempts with a valid user compared to an invalid one could allow attackers to infer if the username is correct. GreyNoise also says that 1,851 shared the same client signature, and of those, approximately 92% were already flagged as malicious. The IP addresses predominantly originate from Brazil and targeted IP addresses in the United States, indicating it may be a single botnet or toolset conducting the scans. The researchers say that the timing of the attack coincides with the US back-to-school season, when schools and universities may be bringing their RDP systems back online. "The timing may not be accidental. August 21 sits squarely in the US back-to-school window, when universities and K-12 bring RDP-backed labs and remote access online and onboard thousands of new accounts," explains GreyNoise's Noah Stone. "These environments often use predictable username formats (student IDs, firstname.lastname), making enumeration more effective. Combined with budget constraints and a priority on accessibility during enrollment, exposure could spike. " However, the surge in scans could also indicate that a new vulnerability may have been found, as GreyNoise has previously found that spikes in malicious traffic commonly precede the disclosure of new vulnerabilities. Windows admins managing RDP portals and exposed devices should make sure their accounts are properly secured with multi-factor authentication, and if possible, place them behind VPNs. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // Surge in Scans Targets Microsoft RDP Authentication Servers

GreyNoise reports a significant increase in scanning activity targeting Microsoft Remote Desktop Web Access and RDP Web Client authentication portals, with nearly 1,971 IP addresses involved.

The coordinated scans aim to exploit timing flaws in RDP systems, potentially setting the stage for future credential-based attacks like brute force or password-spray attempts.

Timing flaws can inadvertently reveal valid usernames by the response time difference between valid and invalid login attempts, aiding attackers in username enumeration.

Approximately 92% of the IP addresses involved have been flagged as malicious, with most originating from Brazil and targeting U.S. IP addresses, indicating a possible botnet operation.

The timing aligns with the U.S. back-to-school season, increasing exposure risk as educational institutions bring RDP systems online with predictable username formats.

The surge may also suggest a new vulnerability discovery, as spikes in malicious traffic often precede such disclosures.

Administrators are advised to secure RDP portals with multi-factor authentication and consider placing them behind VPNs to mitigate potential threats.