Knowledgebase


Portal Home > Knowledgebase > Abuse > Malicious Network Traffic


Malicious Network Traffic




What is Malicious Network Traffic?

Rackbank considers Malicious Network Traffic as any of the following:

Port Scanning

An attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service.

Malicious HTTP GET/POST requests

An attack against a web server to discover commonly used scripts or software, with the goal of exploiting a known vulnerability in that software.

Any type of unauthorized brute-force attack against another server

An attack used for trying many combinations of standard or frequently used username and passwords (e.g.: root/password). These attacks are commonly directed towards SSH,TELNET,FTP and RDP services.

Why is my server sending out malicious network traffic?

This type of activity typically occurs because a malicious script or program was installed on the server. This may have been due to a compromise of the server's security or by a user granted access to your server.

Common Attack Vectors
 
  • Weak login credentials
  • Login credentials have been brute forced or compromised
  • User visited a malicious website and malware was installed without their knowledge
  • A vulnerability in website software allowed the attacker to upload a malicious script
  • A user knowingly installed malicious scripts/software on the server.
 
How can I identify the script or software responsible?

If your operating system is Linux we suggest using the "ps" command to view the running processes on the system. 


How to show all running processes in Linux

If your operating system is Windows we suggest downloading and running Process Explorer from Microsoft. Process Explorer is a more advanced version of Windows Task Manager. You can use this program to help identify processes running on your system that you do not recognize. You can also find where on your system a process is running from and what connections to the internet it is making.


Download Process Explorer


Was this answer helpful?

Add to Favourites Add to Favourites    Print this Article Print this Article

Also Read
What is Phishing? (Views: 1942)

Language: