Solved

Flooded failed login attempts

Posted on 2016-08-22
8
32 Views
Last Modified: 2016-09-20
Hi Experts,

I'm having an issue with my SBS 2008 server is flooded with failed login attempts like the below example. It doesnt tell me where its coming from or how to stop it - any ideas on how do identify the source and block it.

We currently have  a smoothwall setup as our firewall, which i am trying to get changed for a UTM.

Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-a5ba-3e3b0328c30d}" />
    <EventID>4625</EventID>
    <Version>0</Version>
    <Level>0</Level>
    <Task>12544</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8010000000000000</Keywords>
    <TimeCreated SystemTime="2016-08-23T00:45:43.802Z" />
    <EventRecordID>260608564</EventRecordID>
    <Correlation />
    <Execution ProcessID="876" ThreadID="972" />
    <Channel>Security</Channel>
    <Computer>SBS-SERVER.domain.local</Computer>
    <Security />
  </System>
  <EventData>
    <Data Name="SubjectUserSid">S-1-0-0</Data>
    <Data Name="SubjectUserName">-</Data>
    <Data Name="SubjectDomainName">-</Data>
    <Data Name="SubjectLogonId">0x0</Data>
    <Data Name="TargetUserSid">S-1-0-0</Data>
    <Data Name="TargetUserName">ADMINISTRATOR</Data>
    <Data Name="TargetDomainName">
    </Data>
    <Data Name="Status">0xc000006d</Data>
    <Data Name="FailureReason">%%2313</Data>
    <Data Name="SubStatus">0xc000006a</Data>
    <Data Name="LogonType">3</Data>
    <Data Name="LogonProcessName">NtLmSsp </Data>
    <Data Name="AuthenticationPackageName">NTLM</Data>
    <Data Name="WorkstationName">
    </Data>
    <Data Name="TransmittedServices">-</Data>
    <Data Name="LmPackageName">-</Data>
    <Data Name="KeyLength">0</Data>
    <Data Name="ProcessId">0x0</Data>
    <Data Name="ProcessName">-</Data>
    <Data Name="IpAddress">-</Data>
    <Data Name="IpPort">-</Data>
  </EventData>
</Event>
0
Comment
Question by:isdd2000
  • 3
  • 2
  • 2
  • +1
8 Comments
 
LVL 23

Assisted Solution

by:Dr. Klahn
Dr. Klahn earned 125 total points (awarded by participants)
Comment Utility
Quick and dirty:  Install Microsoft TCP View on the afflicted system and watch the IP addresses to see which one(s) is flooding the server.

Slower but provably correct:  Install Microsoft Process Monitor, restrict the events to TCP Connects and Login, and run it for a while.  Then read out the log, correlate connects and login attempts, and see which IP address(es) is flooding the server.
0
 

Author Comment

by:isdd2000
Comment Utility
TCP View is a little difficult to go through everything given its a domain controller the list just keeps updating & i cannot see anything even when paused.

Ill try Microsoft Process Monitor now, i have Trend running a local firewall for Intrusion prevention but it still occurring.
0
 
LVL 35

Expert Comment

by:Kimputer
Comment Utility
Probably it's internal traffic only (and your firewall probably blocks external traffic).
Probably the fastest way to weed it out, is to ask employees to stop using their computers (and close all open windows and apps) for a while. The traffic will now be more manageable.
It could be malware trying brute force, but could also be something as innocent as a misconfigured printer/storage device that tries to deliver files to the server (but doesn't have the correct credentials input).
0
 
LVL 30

Assisted Solution

by:pgm554
pgm554 earned 125 total points (awarded by participants)
Comment Utility
Do you have Remote Web Access set up?
If so ,it's just folks trying to break into your server by using bots.
Unless you take it off the net,there's little you can do.
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Author Comment

by:isdd2000
Comment Utility
Hi Kimputer,

If its local traffic wouldnt the event log have a local ip that is the cause?

pgm554,

We do have RWW setup and i took IIS offline and the attack still came in.
0
 

Author Comment

by:isdd2000
Comment Utility
Also they have tried close to 400 different usernames it can not be an internal device misconfigured.
0
 
LVL 35

Accepted Solution

by:
Kimputer earned 250 total points (awarded by participants)
Comment Utility
Then it sounds like malware. Install Wireshark on the RDP server. Then start a capture on the NIC with
port 3389
(or which ever port it should be).
Obviously, ask the people to stop working for a bit. If not attack pattern is visible (please note your own IP will show up as a stream if you use RDP to connect to the server), then try again with:
port 80 or port 445 or port 135 or port 137  or port 139
Check for attach patterns again.
If still nothing, then try again without any filter (or if you use RDP, use
not port 3389
)
0
 
LVL 23

Expert Comment

by:Dr. Klahn
Comment Utility
System requested close
0

Featured Post

Google Storage: Standard vs. Nearline vs. Coldline

Google Cloud Storage has a number of classes to choose from. Although there are a lot in common, they vary in price and usage terms. This post explains Google Cloud Storage classes and helps to understand which  one to choose.

Join & Write a Comment

By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now