IBM Security Host Protection for Servers (Unix), Virtual Server Protection for Vmware, Proventia Network IPS, Proventia Server IPS for Linux technology, IBM Security Network Protection, RealSecure Server Sensor, IBM Security Host Protection for Servers (Windows), Proventia Network MFS, IBM Security Host Protection for Desktops, Proventia Network IDS, Proventia-G 1.1 and earlier:
This signature detects a Windows Mite backdoor running on your network. This backdoor is typically seen on port 65530/TCP.
IBM Security Host Protection for Servers (Unix): 2.2.2, Virtual Server Protection for Vmware: 1.0, Proventia Network IPS: XPU 1.42, Proventia Server IPS for Linux technology: 1.0, IBM Security Network Protection: 5.1, RealSecure Server Sensor: XPU 22.37, IBM Security Host Protection for Servers (Windows): 1.0.914.0, IBM Security Host Protection for Servers (Windows): 220.127.116.110, Proventia Network MFS: XPU 1.37, IBM Security Host Protection for Desktops: 8.0.614.1, Proventia Network IDS: XPU 22.37, Proventia-G 1.1 and earlier: XPU 22.37
Unauthorized Access Attempt
Windows Mite, also known asBackdoor.WindowsMite.10, Backdoor.WindowsMite.10 Backdoor.WinMite and BackDoor-EB, is a backdoor Trojan affecting Microsoft Windows operating systems. The backdoor uses a client/server relationship, where the server component is installed in the victim's system and the remote attacker has control of the client. The server attempts to open a port, typically TCP port 65530, to allow the client system to connect. Windows Mite backdoor could allow a remote attacker to gain unauthorized access to the system.
Use an up-to-date antivirus program to determine if the target computer is host to a backdoor program. If the program detects a backdoor, follow its instructions to disinfect and repair the computer.
PestPatrol Web site
Windows Mite 1.0
Windows Mite backdoor