Solved

hack problem

Posted on 2004-08-30
9
131 Views
Last Modified: 2010-04-14
Hi,

this morning, I found the D drive of our exchange server is 13 GB data more than usual.
Someone upload a lot of music file...


I also fould folder called emule...there is a thread is system called emule.exe, and I can not stop it...so I could not delete the files on my hard disk

Please help me!
0
Comment
Question by:robinyanwang
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 32

Expert Comment

by:Luc Franken
ID: 11936035
Hi robinyanwang,

yes, it sure looks like you've been hacked :(

Please download Killbox:
http://www.downloads.subratam.org/KillBox.zip

And set it to delete emule.exe on the next reboot, this will make sure it isn't running on your system after a reboot.
Now, try deleting the mess.

Afterwards, you will have to check if you're still having any problems, maybe a backdoor was installed.
Try a tool like trojan hunter => http://www.trojanhunter.com/
The free trial will do fine for identifying.

If that doesn't work, do a full virusscan using one of the online virusscanners (don't trust on your installed one at this moment)
http://www3.ca.com/virusinfo/virusscan.aspx
http://housecall.trendmicro.com/ 

Greetings,

LucF
0
 
LVL 9

Expert Comment

by:BigC666
ID: 11936069
howdy,

yes this is a downloader for Kazza and others, first i would look the remove and install programs for eMule and try to remove it. if that doesn't work let us know.

hope that this helps
0
 

Author Comment

by:robinyanwang
ID: 11936478
interesting...

just 5 mins, it is gone!!!

I deleted some files, folders under that folder (the hacker created),..

maybe he noticed that, so , just 5 mins ago, all 13 GB is gone!

also I can not find the emule.exe in the system thread.

Will he come back? how to stop it? he seems a good man, right?
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 9

Expert Comment

by:BigC666
ID: 11936503
well,
1. have you got all the latest MS updates
2. are you running any antivirus software
3. are you using a firewall

let us know
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 11936505
But as that was possible still indicates that someone has full control on your server :(
So what I still suggest you is to check your system for trojans, virusses etc.
0
 

Author Comment

by:robinyanwang
ID: 11936565
ok, I will do it after working hours in the night.

I will let you guys know if I have any thing wrong.

thanks a lot for your quick reply!
0
 
LVL 9

Assisted Solution

by:BigC666
BigC666 earned 150 total points
ID: 11936569
you bet

just let us know
0
 
LVL 32

Accepted Solution

by:
Luc Franken earned 350 total points
ID: 11936590
Ditto :)

If you're unsure, let us check your running processes.
(as it's 0:17 here I'm going to sleep soon, but I'm sure BigC666 will be able to help you in the time between)

Good luck,

LucF
0
 
LVL 9

Expert Comment

by:MSGeek
ID: 11936974
I wouldn't take the chance, rebuild that box from scratch.  
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question