I think this is their attack method,
1st, the hacker use the port scanner to scan all the Malaysia IP, see which IP is open with port 3389.
Then, for those open port 3389, they use the brute force method key in the username and password, so happen that one of my client account is using the weak password, the hacker manage to go in the server.
2nd, the hacker go in the server, promote the user account to administrator using windows server bugs, then uninstall all the firewall and antivirus software
3rd, the hacker put the ransomware and auto encrypt all documentation and server data file with random password. Then he delete the original files.
4th, the hacker asked for 3000USD as minimum charges to give you the password to decrypt the files.
Ok, so far, 2 of my client server who using windows server 2003 R2 face this kind of problem, anyone of you also face this problem?
Any solutions can be provided?
I know this is the security issues, please don't give the opinion said this is your fault, all the problem happens due to customer budget, now the problem happens, we need the solutions then only we can change the customer mindset.
You all can see the virus picture from the attachment.
Attached thumbnail(s)
Oct 28 2013, 06:31 PM, updated 12y ago
Quote
0.0194sec
1.27
6 queries
GZIP Disabled