Attackers use RDP reconnaissance to identify accessible remote desktop services within a network. Once they locate an RDP-enabled system, they may attempt brute-force authentication, exploit vulnerabilities, or use stolen credentials to gain unauthorized access. Successful exploitation of RDP can provide direct control over a compromised system, allowing an attacker to move laterally, exfiltrate data, or deploy ransomware. This behavior is commonly associated with advanced persistent threats (APTs) and ransomware operators.