Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 218
  • Last Modified:

Did I just get hacked into?

I my event log under security it lists this as a logon/logoff and gives this explanation below.
I was not here that day....so...was this a hack?

Successful Logon:
       User Name:      NETWORK SERVICE
       Domain:            NT AUTHORITY
       Logon ID:            (0x0,0x3E4)
       Logon Type:      5
       Logon Process:      Advapi  
       Authentication Package:      Negotiate
       Workstation Name:      
       Logon GUID:      {00000000-0000-0000-0000-000000000000}

For more information, see Help and Support Center at
0
SiliconDirect
Asked:
SiliconDirect
  • 2
2 Solutions
 
Rich RumbleSecurity SamuraiCommented:
0
 
nripCommented:
yeah its definitely a hack in the true sense of it...may not be a person logging in but a process on another PC logging onto your PC...
0
 
SiliconDirectAuthor Commented:
nrip, can you elaborate?

How would a program get in ?  The only ports that are open to my knowledge are the ones for remote desktop.
0
 
nripCommented:
That is because this looks like the resultant of a backdoor..and you are saying you have a port open for remote desktop ...thast not good news..well besides that a number of ports may be open...which the trojan will open on your PC....in that case the trojan will be allowing access to the human or program at some other location...right...check if ports 190 or 901 are open...

but I may be wrong...(  I hope I am:))
in case you havent patched your OS...it may be an old error showing itself...richrumble has listed this link above...
http://support.microsoft.com/?kbid=305822


0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now