Inside the Dark Web Trade in Compromised Remote Desktop Services
A thriving underground economy exists on dark web forums where cybercriminals buy and sell access to compromised Remote Desktop Services. Recent investigations, including one by Fujitsu CTI, reveal a sophisticated marketplace that puts thousands of poorly secured servers at risk. Understanding this ecosystem is the first step in protecting your organization from becoming another listing.
How Cybercriminals Profit from Compromised Remote Desktop Services
The marketplace for compromised remote desktop services operates with alarming efficiency. One prominent example is the now-closed xdedic.biz, which offered device access through custom malware. A successor platform, Ultimate Anonymous Services (UAS), runs on both the dark web and the clear web, selling compromised servers to anonymous buyers.
Prices vary based on specifications like RAM, bandwidth, and geographic location. For as little as $14, a buyer can gain access to a server running Windows Server 2012 or Windows 10. The UAS RDP team alone claims to offer nearly 30,000 compromised RDS clients. This scale demonstrates the immense vulnerability of internet-facing systems.
The Global Reach of RDP Exploitation
These compromised remote desktop services are not limited by borders. Listings include options for location and administrative privileges. Gaining admin rights on a compromised device allows attackers to move laterally within a network—a tactic seen in major breaches like the OPM hack, which triggered a US government investigation.
Fujitsu CTI identified a brute force tool that targets poorly configured servers directly exposed to the internet. This tool automates the attack process, scanning for weak credentials and exploiting them. The result is a steady supply of compromised machines for sale.
Similarities Between UAS and xdedic
The operational similarities between UAS and xdedic are striking. Both platforms use custom malware to maintain access and provide instructions for hiding administrative accounts on compromised servers. These instructions reveal a deep understanding of Windows OS, enabling criminals to evade detection by system administrators.
This level of technical detail is key to building customer loyalty and repeat business. It also underscores the competition that defensive teams face. Some knowledgeable IT professionals are now working for criminal groups, drawn by the potential rewards.
Defending Against the RDP Threat
To protect against the sale and use of compromised remote desktop services, system administrators must take proactive steps. First, apply strict security protocols to any server exposed to the internet. Ensure that remote desktops have strong password policies, multi-factor authentication, and limited access.
Second, monitor for brute force attacks. The sheer volume of compromised devices on UAS proves that attackers are actively scanning for weak points. Implement threat intelligence systems to detect unusual login patterns.
Third, educate employees about the risks of remote access. A strong security awareness program can prevent credential theft and social engineering attacks. For more on building a robust defense, see our guide on cybersecurity best practices.
Why This Market Matters for Your Organization
The trade in compromised remote desktop services is a clear indicator that complacency is no longer an option. Cybercriminal networks are organized, well-funded, and technically skilled. They exploit the weakest links—often exposed RDP ports with default or weak passwords.
Organizations must make security a boardroom priority. Combining effective threat intelligence, incident response planning, and security education can disrupt these criminal operations. Learn more about how Fujitsu’s ‘Secure Thinking’ approach can help protect your data assets by visiting our framework page.
As the digital landscape evolves, so do the threats. Staying informed and vigilant is the only way to stay ahead. For further reading, check out our article on ransomware prevention tips.