Attackers probing for vulnerable Windows servers

Scanning spike related to buggy ServerProtect antivirus from Trend Micro

Attackers are probing for Windows servers running Trend Micro's ServerProtect antivirus software, researchers warned.

Early today, Symantec's DeepSight threat network monitored a major spike in traffic over TCP port 5168, which is related to the remote procedure call service in ServerProtect. "This may indicate an ongoing mass-scanning and exploitation attempt trying to exploit vulnerable systems for the newly disclosed vulnerabilities," said Symantec analyst Pukhraj Singh in an alert issued to corporate customers.

Symantec also said its honeypots -- "planted" systems that draw attackers by virtue of their unpatched status -- had recorded at least one successful compromise of ServerProtect. "We are in the process of verifying whether or not that attack is in fact leveraging one of the recently reported issues, and not an older one," Singh said.

At its peak, the port scan spike observed by Symantec involved 1,000 devices or systems around the world and originated from more than 300 different IP addresses. Within hours, however, the probing had tapered off somewhat.

Yesterday, the SANS Institute's Internet Storm Center (ISC) also said it had spotted "heavy scanning activity" on TCP 5168, and theorized that the probes were related to ServerProtect. This morning, ISC received samples of suspicious data packets that might be attack code, and farmed it out to analysts for review.

Trend Micro actually updated ServerProtect almost a month ago, but the vulnerabilities only came to light on Monday when VeriSign iDefense published details about them. IDefense had reported the bugs to Trend Micro in mid-June; at least one of the vulnerabilities was partly revealed by researchers who were paid a bounty for their bug-hunting by iDefense's cash-for-vulnerabilities program.

Trend Micro issued a warning of its own yesterday based on the ISC scanning alert to virtually beg ServerProtect users to patch ASAP. "We implore security administrators to apply the latest ServerProtect security patch available from Trend Micro as soon as possible to protect against any potential attack," read the warning.

It's been a rough, and embarrassing, month for security vendors, several of which have had to push out patches to plug holes in their own code. Trend Micro's antispyware scanning engine required a fix this week, as did Check Point's ZoneAlarm line of security products and the open-source Clam AntiVirus.

Interestingly, iDefense first notified Zone Alarm of some of the recently patched bugs almost two years ago, in September 2005.

Recommended

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?