so the server team is having trouble...anybody else see anything like this? In error logs they've shown me it looks like some sort of brute force attack/virus.
just checking the boards...
MODS - if this is in the wrong place feel free to move. Just figured I'd get more hits in OT
process is svchosts.exe...it is performing dictionary attack and randomly scanning IPs for known MS vulnerabilities.
TrendMicro DID NOT find it or detect it.
new worm I think.
-edit- maybe, maybe not....possibly agobot or sdbot
causing all sorts of problems...locking out all the accounts.
more sniffer info...
tries TCP ports:
2745
135
1025
445
3127
6129
139
using what seems to be a combination of the following DST addresses:
Random
First octect of host machine, random 2, 3, 4 octet
First two octect of host machine, random 3, 4 octet
Also appears to retrieve list of AD usernames and perform dictionary attack.
ugghhh....trend didn't pick it up. I'm guessing its new.
-----edit------
binary sent to trend for analysis.
wonder if this is just an agobot variant that is downloaded via infected web pages via the MS critical updates just released?
----edit 2----
Trend confirmed first sighting of new worm agobot.oj (trends name) from the .exe....beta patterns being released.
----edit 3---
every single account is locked out all 15,000, this thing grabs a userlist and tries to brute force it.
just checking the boards...
MODS - if this is in the wrong place feel free to move. Just figured I'd get more hits in OT
process is svchosts.exe...it is performing dictionary attack and randomly scanning IPs for known MS vulnerabilities.
TrendMicro DID NOT find it or detect it.
new worm I think.
-edit- maybe, maybe not....possibly agobot or sdbot
causing all sorts of problems...locking out all the accounts.
more sniffer info...
tries TCP ports:
2745
135
1025
445
3127
6129
139
using what seems to be a combination of the following DST addresses:
Random
First octect of host machine, random 2, 3, 4 octet
First two octect of host machine, random 3, 4 octet
Also appears to retrieve list of AD usernames and perform dictionary attack.
ugghhh....trend didn't pick it up. I'm guessing its new.
-----edit------
binary sent to trend for analysis.
wonder if this is just an agobot variant that is downloaded via infected web pages via the MS critical updates just released?
----edit 2----
Trend confirmed first sighting of new worm agobot.oj (trends name) from the .exe....beta patterns being released.
----edit 3---
every single account is locked out all 15,000, this thing grabs a userlist and tries to brute force it.