The uniformity of the client signature and the timing-based enumeration techniques strongly indicate a coordinated campaign designed to discover valid usernames ahead of credential-based intrusions.
Within this spike, 1,851 of the 1,971 IPs shared the same client signature, pointing to a single toolkit or botnet module powering the activity.
Approximately 92 percent of those IPs were already tagged as malicious by GreyNoise, suggesting the infrastructure behind the scanning had been active in other threat operations.
Source analysis revealed that roughly 73 percent of the scanning originated from Brazil, with the United States as the sole target.
Table: Key Metrics of the August 21 Surge
| Metric | Value |
|---|---|
| Baseline daily IP count | 3–5 |
| IPs observed on August 21 | 1,971 |
| Overlap across both RDP tags | 100% |
| IPs sharing uniform client signature | 1,851 (94%) |
| Previously tagged malicious IPs | 1,698 (92% of uniform signature IPs) |
| Primary source country | Brazil (~73%) |
| Target country | United States |
Late on August 24, GreyNoise identified a follow-on wave exceeding 30,000 unique IPs triggering the same RDP tags from the identical client signature, signaling a dramatic escalation in scope.
This broader wave underscores the attackers’ intent to map exposed RDP endpoints en masse and harvest valid account names through timing-based side channels.
The surge occurs amid the U.S. back-to-school window, when educational institutions bring hundreds of remote labs and RDP-backed environments online.
Predictable username schemes—student IDs and firstname. lastname formats—combined with under-resourced IT teams create a fertile landscape for enumeration attacks.
By confirming valid usernames, adversaries dramatically improve the efficiency of follow-on credential stuffing, password spraying, and brute-force efforts.
RDP enumeration precedes critical exploitation events. Historical examples include the BlueKeep (CVE-2019-0708) campaign, which moved from scanning to widespread exploitation within weeks, as well as documented RDP abuse by espionage actors and ransomware groups such as SamSam.
Research shows that 80 percent of new vulnerabilities are disclosed within six weeks of a spike in scanning activity, highlighting the urgency for defenders to act.
Organizations with exposed RD Web Access and RDP Web Client portals should immediately review and harden authentication workflows.
Mitigations include enforcing multi-factor authentication, limiting access to known IP ranges, enabling account lockout thresholds, and monitoring for unusual timing-based anomalies.
GreyNoise continues to track this activity and will update its dynamic IP blocklist service to help security teams respond faster to emerging threats.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Hackers Actively Scan Microsoft Remote Desktop Web Access from 1,000+ IPs appeared first on Cyber Security News.
Superman sequel Man of Tomorrow is officially filming, and DC Studios co-CEO James Gunn has…
Birthed in New Orleans during the early 20th Century, jazz is likely the earliest known…
INDIANAPOLIS, Ind. (WOWO) — Police in Indianapolis are investigating a shooting that left three people…
MIAMI COUNTY, Ind. (WOWO) — On Friday, Indiana State Police started investigating an inmate’s death…
The Star Trek franchise is at a moment of uncertainty: For the first time since…
The Star Trek franchise is at a moment of uncertainty: For the first time since…
This website uses cookies.