Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Intrusion Prevention alert: MS Windows RDP over non-standard port attempt

Hi guys,

I got three mails from my UTM with this content:

Intrusion Prevention Alert

An intrusion has been detected. The packet has been dropped automatically.
You can toggle this rule between "drop" and "alert only" in WebAdmin.

Details about the intrusion alert:

Message........: OS-WINDOWS Microsoft Windows Terminal server RDP over non-standard port attempt
Details........: www.snort.org/search?query=49040
Time...........: 2019-09-13 13:30:36
Packet dropped.: yes
Priority.......: high
Classification.: Attempted User Privilege Gain
IP protocol....: 6 (TCP)

Source IP address: 45.136.108.25
Source port: 836
Destination IP address: Internal_address_of_my_server
Destination port: 9901

The first attack from the same source IP (iptracker.org says, it's a German IP, but nothing else) was against port 80 on another server facing the internet (but not on port 80). The second attack was against port 9901 on a second server (see above) and the third one was on destination port 5060 (SIP Port) on one of my Wifi routers, which is also responsible for our landline phone. I looked up on the link, which is given in the mail and found this:

An attacker can get access to several devices using a compromised Windows computer that is located behind a Firewall that allows RDP access (configured previously by the Firewall administrator) to that computer. The attacker can force the victim computer to forward RDP requests to other internal computers or servers in an attempt to move laterally inside the victim network.

Now I'm asking if there is some sort of vulnerability in my firewall and if the attacker is able to specifically attack my servers facing the internet, why and how he got that information.

To be more clear, I'm asking if this only a notification, that the firewall blocked this attack or if I have a vulnerability considering this type of attack.

BTW, the attacked servers are non-Windows machines, I have no Windows RDP on any of my Windows machines. And of course not for remote access.

Since the attacks came from one single IP, I followed this "tutorial" to set up DNAT to a blackhole and a firewall rule to block everything from specific IPs:
community.sophos.com/.../utm-9-block-specific-ip

Port 3389 is of course not open in the firewall.

Is there anything else, I can do?

Thank you very much for your help!

Flo



This thread was automatically locked due to age.
  • Ok, thank you. 

    Just for my understanding, my "layers" of security are then:
    1. Country-Blocking

    2. IPS

    3. DNAT

    4. Firewall rules (UTM)

    5. Firewall rules and further hardenings on the server (if applicable)

     

    Is that correct? And is it sufficient for this small webserver?



    BTW, I decided to set up the UTM as an additional hardening for the weather station. I came from setting up a DMZ, over Edgerouter X/Mikrotik Hex Router to pfSense/IPFire and of course the UTM. 


    Thank you for your help Bob!

    Flo

  • I think that for Anti-DoS/Flooding and Anti-Portscan, IPS comes before DNATs, but that Snort Attack Patterns comes after.  It sounds like you're way ahead of what even some businesses do, Flo!

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Ok.
    That's good to hear, hopefully I didn't make any mistake and make myself vulnerable. But a Golismero scan under Kali Linux (yes I did some pentesting with kali before i released the weather station to the public :D) said, that it found no vulnerability, I think that sounds not too bad.

     

    One last question, what should I do with the webserver protection and the renewal of the certificate when I get a new public IP?

     

    Flo

  • Use a free dynamic DNS service and make the certificate for the FQDN instead of your current numeric IP.  The UTM automatically updates the IP to which the FQDN resolves.  PM me the URL of your weather station and I'll make a more-specific recommendation.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Thank you, I send you a pm.