Research

RDP Exposed to Internet: How to Find and Secure Remote Desktop

person Zondex Research Team calendar_today Apr 22, 2026 schedule 5 min read
RDP Exposed to Internet: How to Find and Secure Remote Desktop

Organizations with RDP exposed to internet face critical security vulnerabilities, including direct access for attackers, data breaches, and ransomware deployment. Zondex provides immediate visibility into these exposed assets, allowing IT and security teams to quickly identify and secure their internet-facing Remote Desktop services before they are exploited.

The Pervasive Threat of RDP Exposure

Remote Desktop Protocol (RDP) is a fundamental tool for system administrators and users alike, enabling remote control over Windows machines. Its ubiquity, however, makes it a prime target for threat actors. When RDP is directly exposed to the internet without proper security controls, it becomes a high-value entry point for initial access, leading to ransomware deployment, data exfiltration, and full network compromise. This isn't theoretical; RDP exploitation is consistently cited by cybersecurity agencies, including CISA and the FBI, as a top initial access vector for ransomware groups and other malicious campaigns.

Globally, millions of RDP instances are discoverable online. A significant portion of these lack crucial security measures, such as Network Level Authentication (NLA) or multi-factor authentication (MFA). Attackers leverage automated scanning tools to identify these vulnerable endpoints, then employ brute-force attacks, credential stuffing, or exploit known vulnerabilities to gain unauthorized access. The consequences are severe, ranging from minor disruptions to catastrophic financial and reputational damage.

Common attack vectors targeting exposed RDP include:

  • Brute-Force and Credential Stuffing: Automated attempts to guess passwords or reuse stolen credentials against RDP logins.
  • Vulnerability Exploitation: Exploiting unpatched RDP vulnerabilities, such as BlueKeep (CVE-2019-0708).
  • NTLM Relay Attacks: Capturing and relaying NTLM authentication hashes to other systems.
  • Ransomware Deployment: RDP is a favorite pathway for ransomware gangs (e.g., Ryuk, Maze, Conti) to gain a foothold and spread across a network.

Identifying RDP Exposed to Internet with Zondex

Zondex, an internet search engine for devices, services, and vulnerabilities, offers a powerful platform to discover and analyze internet-facing RDP services. By indexing billions of network assets, Zondex provides unparalleled visibility into the global landscape of exposed RDP endpoints. Security teams can use Zondex to assess their own attack surface, identify rogue RDP deployments, and monitor for newly exposed systems.

To find RDP instances, Zondex analyzes network banners, open ports, and protocol signatures. The standard port for RDP is TCP 3389, though administrators often change it for obfuscation – a practice that offers minimal security benefit against determined attackers. Zondex can identify RDP regardless of the port, providing a comprehensive view.

Basic Zondex Queries for RDP

Starting with a broad search is simple. To find all services identified as RDP on their default port:

port:3389 product:rdp

If you want to see all devices with port 3389 open, regardless of Zondex's product detection:

port:3389

Advanced Zondex Queries for Granular Insight

Zondex allows for highly specific queries to narrow down your search and gain actionable intelligence. This is crucial for large organizations or those needing to comply with geographic or regulatory requirements.

  • Filter by Country: Identify RDP servers in specific regions.

    zondex port:3389 product:rdp country:"US"

  • Filter by Organization: Pinpoint RDP services belonging to a specific organization or ASN.

    zondex port:3389 product:rdp org:"Acme Corp"

  • Filter by Operating System: Focus on RDP instances running on particular OS versions.

    zondex port:3389 product:rdp os:"Windows Server 2019"

  • Identify RDP with Specific Vulnerabilities: Zondex indexes known vulnerabilities. While direct RDP CVEs might be complex to filter via banner, common OS vulnerabilities are often associated.

    zondex port:3389 product:rdp vuln:CVE-2019-0708 (Note: Direct RDP banner data might not always explicitly state a patch status, but Zondex's vulnerability indexing can correlate with OS versions or known indicators.)

  • RDP with NLA Disabled: Identifying systems where Network Level Authentication is not enforced is critical, as these are more susceptible to brute-force attacks.

    zondex port:3389 product:rdp nla:false

Decoding RDP Banners and Service Information

Zondex captures extensive metadata from RDP services, often including the underlying operating system and specific build numbers. This information is invaluable for identifying unpatched systems or particular configurations. For example, the banner might reveal "Windows Server 2012 R2" or "Windows 10 Enterprise."

This data allows for targeted vulnerability assessments. If you know a specific CVE affects a particular Windows version or build number, you can create a Zondex query to find those exact systems globally or within your monitored assets. This is similar to how we identify exposed Elasticsearch clusters by their version and configuration details.

Example: Zondex RDP Exposure Data Snapshot

Country Total RDP Instances (port 3389) RDP with NLA Disabled (Estimated) Top OS Detected Common RDP Banners Found
United States ~2.5 Million ~450,000 Windows Server 2016/2019/2022 TS Gateway, Microsoft RDP 10.0
Germany ~680,000 ~120,000 Windows Server 2012 R2 MS-RDP 8.1, Terminal Services
China ~1.1 Million ~200,000 Windows 10 Pro RDP-Tcp, Standard RDP Login
Brazil ~420,000 ~80,000 Windows Server 2019 Microsoft Remote Desktop Services
India ~550,000 ~100,000 Windows Server 2016 RDP-Tcp (SSL Enabled)

Note: Numbers are illustrative and based on typical proportions observed across internet scanning platforms.

Vulnerabilities Targeting Exposed RDP

The history of RDP is dotted with critical vulnerabilities, making the need to secure any RDP exposed to internet connections paramount.

BlueKeep (CVE-2019-0708)

This infamous pre-authentication remote code execution vulnerability in RDP services affected older Windows operating systems (Windows 7, Windows Server