?
Solved

Hacker or Automated Process?

Posted on 2013-10-27
2
Medium Priority
?
231 Views
Last Modified: 2013-11-05
I was working on my network all this week using remote desktop from several machines as I went back and forth making various updates. I went home and logged into my terminal server from remote desktop and to my horror someone logged in under my credentials and booted me off. I logged back in and booted him off. I shut down my terminal server.

I was using my main active directory administrator password. My firewall has a different password. So i think that is in tact.

I changed my password. It turns out my virus scanner was expired on the terminal server. I updated it and it found 33 viruses and I ran a trojen horse scanner. It appears the server is now clean.

Three ays went by and I am at home again and BOOM it happened again! Iwas booted off by another login using same credentials.

Could this be a hacker or is it an open rdp session that I may have left on at work and it just retries and logs back in?

I changed my admin password before I ran the virus scan. Could it have already broadcasted my new password to whomever may be tracking.

I don't know what to do at this point. Any help would be greatly appreciated. I'm worried other servers could be compromised.
0
Comment
Question by:MEATBALLHERO
2 Comments
 
LVL 25

Accepted Solution

by:
Dirk Kotte earned 1000 total points
ID: 39604230
first, disable external access to the server.

next, you should rebuild your server!
it is not possible to find and clean all viruses, trojan horses or intruder installed programs if the hacker knows what he do.

you should prevent using the the "domain\administrator" account for external logins, because this account is never locked out ... so the hacker has unrestricted attempts to gain the password.

you should use a ssl-/webgateway to preauthenticate the user before he reach the rdp-server / RDP over VPN is a option also.

sorry, but i see no simple solution.
0
 
LVL 15

Assisted Solution

by:cwstad2
cwstad2 earned 1000 total points
ID: 39604231
you can try this

http://gallery.technet.microsoft.com/scriptcenter/PowerShell-script-to-Find-d2ba4252

also if you have an account password lockout policy and you have changed your password, it should lock you out if there are any old RDP sessions logging you on with old password. If you're unsure copy the old profile, create a new one and disable the one you suspect of being compromised.
0

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
Sometimes it necessary to set special permissions on user objects.  For instance when using a Blackberry server, the SendAs permission needs to be set. I see many admins struggle with the setting that permission only to see it disappear within a few…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

593 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question