Solved

Hacker or Automated Process?

Posted on 2013-10-27
2
207 Views
Last Modified: 2013-11-05
I was working on my network all this week using remote desktop from several machines as I went back and forth making various updates. I went home and logged into my terminal server from remote desktop and to my horror someone logged in under my credentials and booted me off. I logged back in and booted him off. I shut down my terminal server.

I was using my main active directory administrator password. My firewall has a different password. So i think that is in tact.

I changed my password. It turns out my virus scanner was expired on the terminal server. I updated it and it found 33 viruses and I ran a trojen horse scanner. It appears the server is now clean.

Three ays went by and I am at home again and BOOM it happened again! Iwas booted off by another login using same credentials.

Could this be a hacker or is it an open rdp session that I may have left on at work and it just retries and logs back in?

I changed my admin password before I ran the virus scan. Could it have already broadcasted my new password to whomever may be tracking.

I don't know what to do at this point. Any help would be greatly appreciated. I'm worried other servers could be compromised.
0
Comment
Question by:MEATBALLHERO
2 Comments
 
LVL 24

Accepted Solution

by:
Dirk Kotte earned 250 total points
ID: 39604230
first, disable external access to the server.

next, you should rebuild your server!
it is not possible to find and clean all viruses, trojan horses or intruder installed programs if the hacker knows what he do.

you should prevent using the the "domain\administrator" account for external logins, because this account is never locked out ... so the hacker has unrestricted attempts to gain the password.

you should use a ssl-/webgateway to preauthenticate the user before he reach the rdp-server / RDP over VPN is a option also.

sorry, but i see no simple solution.
0
 
LVL 15

Assisted Solution

by:cwstad2
cwstad2 earned 250 total points
ID: 39604231
you can try this

http://gallery.technet.microsoft.com/scriptcenter/PowerShell-script-to-Find-d2ba4252

also if you have an account password lockout policy and you have changed your password, it should lock you out if there are any old RDP sessions logging you on with old password. If you're unsure copy the old profile, create a new one and disable the one you suspect of being compromised.
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question