By ThreatListPro Security Team · Published March 14, 2026 · Last verified: March 14, 2026
Remote Desktop Protocol (RDP) on port 3389 is the single most exploited entry point for ransomware. Attackers use botnets to scan the entire internet for exposed RDP endpoints, then launch automated credential-guessing campaigns that can try thousands of username and password combinations per hour. Once they get in, they have full desktop access—and full control of your server.
This guide explains how RDP brute force attacks work, why they are so dangerous, and the fastest ways to stop them—starting with solutions you can deploy in under 5 minutes.
What Is an RDP Brute Force Attack?
An RDP brute force attack is an automated assault on the Windows Remote Desktop Protocol service, typically running on port 3389. Attackers use botnets and automated tools to rapidly submit username and password combinations, attempting to find valid credentials that grant remote desktop access to the target server.
The attack process is straightforward: scanning tools sweep large IP ranges looking for hosts with port 3389 open. When they find one, they launch credential-guessing campaigns using common usernames like Administrator, admin, user, and backup, combined with password lists compiled from previous data breaches and common patterns.
Unlike VPN brute force attacks that target a login portal, RDP attacks target the desktop session directly. A successful RDP brute force gives the attacker an interactive Windows desktop with whatever privileges the compromised account holds—often local or domain administrator.
Why RDP Is the Top Ransomware Vector
Multiple cybersecurity reports consistently identify RDP as the number-one initial access vector for ransomware. An estimated 80% of ransomware incidents begin with a compromised RDP session. Here is why RDP is so heavily targeted:
- Massively exposed: Shodan and Censys scans routinely find millions of servers with port 3389 open to the internet. Many organizations expose RDP for convenience without understanding the risk.
- Direct admin access: Unlike a VPN which grants network access, RDP gives the attacker a full interactive desktop. They can install software, disable security tools, access files, and pivot to other systems immediately.
- Weak authentication: Many RDP deployments rely on simple username and password authentication without MFA. Default Windows accounts like
Administratorare well-known targets. - No lockout by default: Windows does not enable account lockout policies by default. Without explicit configuration, an attacker can try unlimited passwords with no penalty.
- Ransomware-as-a-Service: Criminal groups sell compromised RDP credentials on dark web marketplaces for as little as $5 per server. Ransomware operators buy bulk RDP access and deploy payloads across hundreds of organizations simultaneously.
The Real Impact
The consequences of RDP brute force attacks extend far beyond the initial compromise. Even unsuccessful attacks cause significant operational damage:
Account Lockouts
When Active Directory account lockout policies are configured, RDP brute force attacks trigger lockouts for every username the attacker targets. This locks out legitimate administrators and users, preventing them from logging in to critical systems. During a sustained campaign, dozens of accounts can be locked out daily.
Ransomware Deployment
When an attacker successfully brute-forces an RDP credential, the typical next step is ransomware deployment. With interactive desktop access, attackers disable antivirus, exfiltrate sensitive data, and deploy ransomware across the network. Average ransomware recovery costs exceed $1.8 million per incident.
Data Exfiltration
Modern ransomware operations practice “double extortion”—they steal sensitive data before encrypting it. With RDP access, attackers can browse file shares, databases, and email archives, exfiltrating confidential information that is then used as additional leverage for ransom payment.
Compliance Violations
An RDP breach can trigger compliance violations across multiple frameworks. HIPAA requires access controls and audit logging for systems handling protected health information. PCI DSS mandates network segmentation and strong authentication for systems in the cardholder data environment. A single compromised RDP session can result in reportable breaches, regulatory fines, and loss of certifications.
Incident Response Costs
Even when ransomware is not deployed, responding to an RDP compromise requires forensic investigation, credential resets, system rebuilds, and security architecture review. Organizations typically spend 200 to 500 hours of staff time responding to a single RDP-related incident.
Solutions Ranked by Speed
Here are the most effective ways to protect RDP from brute force attacks, ranked by how quickly you can deploy them:
1. IP Blocklist at Firewall (5 Minutes)
The fastest solution. Block known RDP attackers at your firewall using an External Dynamic List (EDL) before their traffic ever reaches port 3389. ThreatListPro provides a curated blocklist of IP addresses actively engaged in brute force attacks, including those targeting RDP. You paste the URL into your firewall’s EDL configuration, create a deny rule for traffic to port 3389, and commit. The attacker’s connection is refused at the network perimeter.
2. Network Level Authentication (30 Minutes)
Network Level Authentication (NLA) requires users to authenticate before a full RDP session is established. Without NLA, the server presents a login screen to anyone who connects—consuming resources and exposing the system to pre-authentication exploits. With NLA enabled, authentication happens at the network layer first, and only authenticated users see the desktop.
NLA is a Group Policy setting that can be enabled across all servers in minutes. It significantly reduces the attack surface but does not prevent credential guessing—it simply moves the authentication checkpoint earlier in the connection process.
3. RDP Gateway (Hours)
A Remote Desktop Gateway (RD Gateway) acts as a secure proxy for all RDP connections. Instead of exposing port 3389 directly, users connect to the gateway over HTTPS (port 443), authenticate with MFA, and the gateway brokers the RDP session to the internal server. This completely eliminates direct RDP exposure to the internet.
Deploying an RD Gateway requires a Windows Server with the Remote Desktop Gateway role, SSL certificates, and configuration of connection authorization and resource authorization policies. Expect several hours for initial setup plus testing.
4. VPN-Only Access (Hours)
Never expose RDP directly to the internet. Instead, require users to connect to a VPN first, then access RDP over the encrypted tunnel. This means port 3389 is only reachable from the internal network or VPN subnet, making it invisible to internet scanners and brute force bots.
If you already have a VPN infrastructure, this can be implemented by adding firewall rules that restrict port 3389 to VPN address ranges only. If you need to deploy a VPN solution from scratch, expect a longer timeline.
5. Remove RDP Entirely (Varies)
The most secure option: eliminate RDP exposure entirely by switching to alternative remote access solutions. Options include Azure Bastion (browser-based RDP through the Azure portal with no public IP required), SSH tunnels for command-line access, and modern remote management tools like Windows Admin Center or commercial solutions that do not require port 3389.
Migration timelines depend on your environment size and the alternative solution chosen. For cloud-hosted workloads, Azure Bastion can be deployed in under an hour. For on-premises environments, a full migration away from RDP may take weeks.
Why Perimeter Blocking Is Critical for RDP
RDP is fundamentally different from VPN in one critical way: it provides direct interactive desktop access. A compromised VPN credential gives network access, but the attacker still needs to find and exploit internal systems. A compromised RDP credential gives the attacker a fully functional Windows desktop with immediate access to files, applications, and the ability to install software.
This is why blocking at the firewall is essential. Every RDP brute force attempt that reaches your server is a potential ransomware incident. Blocking known attacker IPs at the perimeter prevents the connection entirely—no authentication attempt, no lockout, no risk of compromise.
- Stops attacks before they start: Firewall blocks the TCP connection, so the attacker never reaches the RDP service
- Prevents account lockouts: No failed authentication means no lockout triggers
- Reduces attack surface: Works alongside NLA, RD Gateway, and VPN for defense in depth
- Zero user impact: Legitimate users are unaffected because they connect from clean IPs
- Automatic updates: ThreatListPro’s blocklist refreshes automatically, adding new attacker IPs without manual intervention
Frequently Asked Questions
What is an RDP brute force attack?
An RDP brute force attack is an automated attempt to gain access to a Windows server by rapidly trying username and password combinations against the Remote Desktop Protocol service on port 3389. Attackers use botnets to scan the internet for exposed RDP endpoints and launch sustained credential-guessing campaigns that can last for days or weeks.
Why is RDP the #1 ransomware entry point?
RDP is exposed on millions of internet-facing servers, often with weak passwords and no MFA. Unlike VPN, RDP gives attackers a full interactive desktop with direct access to files, applications, and admin tools. An estimated 80% of ransomware incidents begin with a compromised RDP session, making it the single most exploited initial access vector.
How do I protect RDP from brute force?
The fastest protection is an IP blocklist configured as an External Dynamic List (EDL) on your firewall, blocking known attackers before they reach port 3389. Additional measures include enabling Network Level Authentication, routing RDP through an RD Gateway with MFA, requiring VPN access before RDP, or replacing RDP with alternatives like Azure Bastion.
Should I expose RDP to the internet?
No. Every major cybersecurity framework recommends against exposing RDP directly to the internet. If remote desktop access is required, use a VPN, RD Gateway with MFA, or a zero-trust solution. If you must expose RDP, use IP blocklists, NLA, and strong account lockout policies as minimum protections.
Can ThreatListPro block RDP attackers?
Yes. ThreatListPro provides a curated blocklist of over 2 million IP addresses engaged in brute force attacks, including those targeting RDP on port 3389. Configure the blocklist as an EDL on your firewall with a deny rule for port 3389 traffic. Setup takes under 5 minutes and the list updates automatically.