// soc investigation 2026-02-08
SOC176 RDP Brute Force Detected
letsdefend Medium closed ✓ true positive
mitre/T1110 mitre/T1078 bruteforce
analyst verdict TRUE POSITIVE

🧾 Alert Summary

MITRE ATT&CK

WHO:
External attacker from IP 218.92.0.56 targeting host Matthew (172.16.17.148). IP also has a malicious reputation on virustotal - https://www.virustotal.com/gui/ip-address/218.92.0.56/detection

WHAT:
RDP brute-force attack observed. Multiple failed login attempts (EventID 4625) against different accounts followed by a successful login (EventID 4624, Logon Type 10 – RemoteInteractive).

WHEN:
Mar 07, 2024 at ~11:44 AM.

WHERE:
Windows host Matthew (172.16.17.148) over RDP (TCP 3389).

WHY:
Attacker attempted credential guessing via RDP and successfully authenticated to account Matthew, indicating potential account compromise.

HOW:
Automated brute-force attempts from a single external IP. After repeated login failures, valid credentials were used resulting in successful remote interactive logon.

Successful external RDP authentication strongly indicates compromised credentials and potential host compromise.

ACTION TAKEN