Darkman wrote:
I let my norton expire for a few days, and noiced in my event viewer anumber of connections to VNC from various other countries. however I didn't notice the icon turning black as it would in a conneciton mode. so I was wondering if I am being connected to, via some trojan. I did a scan today after updating norton and found one trojan and one or two other website deposited remote access files.... anyone ever see conneciton instances in their event logs?

Earlier this year I reported an incident in this listserv where I was holding a demo on ways to use VNC to connect to other systems. It was actually part of an two day Internet security lecture. I was using a personal computer at home as the server. I set it up in the morning and since I knew that the the RealVNC was still exposed to the after the demo I turn it off remotely. I was tied up the rest of the day and my wife unknowingly turned my computer on. Sure enough, right when I sat down to look at my computer someone had been connected using my VNC just a few seconds earlier. I un-installed the vnc server and the person had no time to do anything. I had noticed that even while I was doing the demo there were connection attempts at the RealVNC ports in the event viewer that were not mine. Later I discovered that they were most likely hackers from parts of Europe and the US looking for vulnerable networks and VNC connections. Eventually one of them guessed the weak password (or at least I hope that's what it was). To answer your question it would seem that this occurs quite commonly and I have demonstrated this by exposing an old laptop an open Internet connection and recording the various connection attempts in an unrecommended environment. However this is well known and has been going on for sometime. The thing that really got my attention was when the vulnerability was discovered it only took about a two days before I saw some forums with good guesses of what the vulnerability was and how it could be exploited and later someone send me a post from someone who explained in detail what it was. For some reason news of the vulnerability spread fast among hackers and at a rate that would put Microsoft vulnerabilities to shame, but it's not as widespread as Microsoft's problems yet. Most of this is due to the patch that came about a day later to fix it (I like to see Microsoft move that fast). This will make a good argument to introduce an automatic update feature to all VNC programs and perhaps a way to detect and notify the user of unsafe conditions. Anyway I can't wait to see what happens it seems unlikely that everyone will know to upgrade their 4.1.1 realvnc before something bad happens that, if the press gets involved, will spell doom for VNC's in general.

Jorge
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to