WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Attackers are Scanning Microsoft Remote Desktop Servers in Huge Coordinated Campaign
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Attackers are Scanning Microsoft Remote Desktop Servers in Huge Coordinated Campaign

TLP:CLEAR

Author: Chase Snow

Created: Thursday, August 28, 2025 - 13:31

Categories: Cybersecurity, Security Preparedness

Summary: Last week, research from intelligence firm GreyNoise observed a substantial increase in scanning activity, with nearly 2,000 unique IP addresses simultaneously probing Microsoft Remote Desktop Access and RDP Web Client authentication portals. A much larger wave of over 30,000 unique IPs was noticed a few days later, largely from the same client signature as the first wave. A normal baseline for these kinds of scans is usually 3-5 IP addresses per day, according to the researchers, indicating a massive coordinated reconnaissance campaign targeting Microsoft Remote Desktop.

Analyst Note: A massive surge in scans could potentially indicate that a new vulnerability has been found, as researchers have previously found spikes in malicious traffic often precede the disclosure of new vulnerabilities. GreyNoise also points out that threat actors have leveraged RDP in the past to conduct espionage, deploy ransomware, and run global exploit campaigns.

Original Source: https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop

Additional Reading:

  • Surge in coordinated scans targets Microsoft RDP auth servers

Related WaterISAC PIRs: 6, 10

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar