Solved

Hacker or Automated Process?

Posted on 2013-10-27
2
203 Views
Last Modified: 2013-11-05
I was working on my network all this week using remote desktop from several machines as I went back and forth making various updates. I went home and logged into my terminal server from remote desktop and to my horror someone logged in under my credentials and booted me off. I logged back in and booted him off. I shut down my terminal server.

I was using my main active directory administrator password. My firewall has a different password. So i think that is in tact.

I changed my password. It turns out my virus scanner was expired on the terminal server. I updated it and it found 33 viruses and I ran a trojen horse scanner. It appears the server is now clean.

Three ays went by and I am at home again and BOOM it happened again! Iwas booted off by another login using same credentials.

Could this be a hacker or is it an open rdp session that I may have left on at work and it just retries and logs back in?

I changed my admin password before I ran the virus scan. Could it have already broadcasted my new password to whomever may be tracking.

I don't know what to do at this point. Any help would be greatly appreciated. I'm worried other servers could be compromised.
0
Comment
Question by:MEATBALLHERO
2 Comments
 
LVL 23

Accepted Solution

by:
Dirk Kotte earned 250 total points
ID: 39604230
first, disable external access to the server.

next, you should rebuild your server!
it is not possible to find and clean all viruses, trojan horses or intruder installed programs if the hacker knows what he do.

you should prevent using the the "domain\administrator" account for external logins, because this account is never locked out ... so the hacker has unrestricted attempts to gain the password.

you should use a ssl-/webgateway to preauthenticate the user before he reach the rdp-server / RDP over VPN is a option also.

sorry, but i see no simple solution.
0
 
LVL 15

Assisted Solution

by:cwstad2
cwstad2 earned 250 total points
ID: 39604231
you can try this

http://gallery.technet.microsoft.com/scriptcenter/PowerShell-script-to-Find-d2ba4252

also if you have an account password lockout policy and you have changed your password, it should lock you out if there are any old RDP sessions logging you on with old password. If you're unsure copy the old profile, create a new one and disable the one you suspect of being compromised.
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains how to install and use the NTBackup utility that comes with Windows Server.
An article on effective troubleshooting
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question