Solved

A client saw a message on her PC that says, "Jason-PC disconnected" - does that mean that someone was on her computer?

Posted on 2011-03-03
8
298 Views
Last Modified: 2012-05-11
We had one of our legal advisors at a business yesterday and just before she shut down her computer she said she saw a message box pop up in the bottom right hand corner of her screen that says, "Jason-PC Disconnected".  Keep in mind, when she got there yesterday their IT guy put her on their network so that she could 1) use the web and 2) print to their shared printer.

I remote logged into her computer this morning and saw that "File Print Sharing" was on... so my question is, does that mean that anyone on their network would be able to see her files?  If so, would it really give her a message that says says someone disconnected?  I've never seen that message before and I'm trying to figure out if I should be concerned.. and/or what to do about it.  I did turn OFF file / print sharing while i was logged in.

Any suggestions?
0
Comment
Question by:sherrills
8 Comments
 
LVL 1

Expert Comment

by:Trusol
ID: 35027799
Did the clients IT department remote to her at any time? It sounds like there was a Damware or similar software session going on, and when she logged off, the network connection closed and disconnected the remote session.

Even if they had shared out her hard drive for some reason, you wouldn't actively see when someone was on like that, you'd have to go to shared folders -> open shares to see who was acessing files on your computer. If you want peace of mind though, you can go to Shares under shared folders and remove the default c$ admin share, as well as make sure nothing else has been shared out
0
 
LVL 27

Expert Comment

by:Lukasz Chmielewski
ID: 35027815
This could be any third party software of VNC type. Sharing a desktop and being logged on witout any soft in Windows requires user to accept a connection.
0
 
LVL 4

Expert Comment

by:ChuckDeezel
ID: 35028514
Was she put on a Wireless network? If so there is a slight chance that the wireless network was named Jason-PC. Just a shot in the dark there. Now, why someone would name an SSID Jasons-PC is beyond me, but I have seen stranger SSID's.
0
 

Author Comment

by:sherrills
ID: 35028699
She was on a wireless network, but I agree Jason-PC would be a very strange name for the network... i'll remote back into her PC and see if I can see what the wireless network name is.

The clients IT department should definitely not have remoted into her PC... hmmm so is there a way to see if someone was accessing shared files at this point or is it too late?
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 1

Accepted Solution

by:
Trusol earned 250 total points
ID: 35028826
As far as I know, not unless you had auditing enabled on your files, which would be very unusual for a workstation.
0
 
LVL 4

Expert Comment

by:ChuckDeezel
ID: 35028974
Check the event log. Look under the security and under the system log (hell application log while you are at it to see if there were any unusual applications launched around the time that she was logged in. Applications that she would not normally launch in her day to day operations, or maybe see if there are any entries for remote assist, dameware, etc.
0
 
LVL 4

Expert Comment

by:ChuckDeezel
ID: 35028980
Sorry, event log is under Control Panel, Administrative Tools.
0
 
LVL 32

Expert Comment

by:aleghart
ID: 35029967
"Jason-PC" was probably another computer on the network.  It may not have been snooping, as there are applications that automatically look for shared files.  iTunes searches the network for other iTunes users.

Then again...if it was disconnected, that means it was actually connected to content.

Also, it didn't have to be a remote connection like RDP or VNC.  You can connect to a file share or administrative share without installing/running software.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now