Page 2 of 2 FirstFirst 12
Results 11 to 19 of 19

Thread: Suspicious Traffic being reported in FW logs

  1. #11
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Location
    Shawnee country
    Posts
    1,243
    The ip address for "7oo.meibu.com" is 222.133.185.232. You could check your logs for any connections there.

    I ran 222.133.185.232 thru apnic.net's site and also visited the ip address via Firefox. Jiagoo.com uses that ip address, hosted by China Network Communications Group Corporation. CNCGC owns a range of ip addresses: 222.132.0.0 - 222.135.255.255

    Might block anything in the range in your FW (unless you're doing business with someone in China).

    edit -- looking at dalek's McAfee links, these trojans are ranked low risk.
    “Everybody is ignorant, only on different subjects.” — Will Rogers

  2. #12
    Junior Member
    Join Date
    Jul 2006
    Posts
    4
    I don't athink that trojan should be considered "low-risk".

    If it's able to spawn a command shell with Local System privileges and can accept remote commands to shutdown/reboot a server, that's a pretty high-risk trojan IMO.

  3. #13
    AOs Resident Troll
    Join Date
    Nov 2003
    Posts
    3,152
    hucast21...you are very right

    My question is ....how does a trojan get into a server.....in the first place...and the system dir to boot.

    MLF
    How people treat you is their karma- how you react is yours-Wayne Dyer

  4. #14
    Junior Member
    Join Date
    Jul 2006
    Posts
    4
    Trojans on the server can be caused by many things:

    Viruses/worms out in the wild that drop trojans during their payload, creating botnets.

    Network admin surfs the net using the server instead of a workstation. (You'd be surprisd on how many do this...) While surfing, he/she comes across a website that has a 0-day exploit for IE in its code, installing the trojan from there.

    Trojans posing to be legitimate applications. Can be spread via email, IM, or P2P networks like Bearshare, Kazaa, Limewire, etc.

    Those are some ways off the top of my head.

  5. #15
    AOs Resident Troll
    Join Date
    Nov 2003
    Posts
    3,152
    Thanks....

    I am well aware how these things happen....my point was that the server is obviously be used as a workstation.....

    BackDoor-CKB-
    When run.....................
    BackDoor-CPX
    Upon execution
    Somebody clicked on something....


    MLF
    How people treat you is their karma- how you react is yours-Wayne Dyer

  6. #16
    Junior Member
    Join Date
    Jul 2006
    Posts
    4
    Gotcha.

    I misunderstood your post, sorry about that.

  7. #17
    AOs Resident Troll
    Join Date
    Nov 2003
    Posts
    3,152
    This server is a application server that houses mostly engineering apps. It does not host email of any kind.
    Oh......I think I figured it out........Engineers

    MLF
    How people treat you is their karma- how you react is yours-Wayne Dyer

  8. #18
    Dissident 4dm1n brokencrow's Avatar
    Join Date
    Feb 2004
    Location
    Shawnee country
    Posts
    1,243
    Here's the other half of my 'two bits':

    1) Clean it up. Try an online scan (Trendmicro or Panda) to get a second opinion, too. Clean up all the temp chit, too.

    2) Run MS's Port Reporter on that server if you got the time for another log file. It might be the app you're looking for.

    3) Dust off the backups if you got to go to Plan B.
    “Everybody is ignorant, only on different subjects.” — Will Rogers

  9. #19
    Junior Member
    Join Date
    Jul 2006
    Posts
    4
    3) Dust off the backups if you got to go to Plan B.
    A word of caution about backups: He might not to be able to pinpoint when the trojan was installed on the server. The intruder could've connected to the backdoor and installed even more files. The server would then make successful backups of the compromised files.

    So, at a server break-in, it's kind of hard to trust your backups.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •