IBM Security Network Protection, Proventia Network MFS, RealSecure Server Sensor, Proventia Server IPS for Linux technology, IBM Security Host Protection for Servers (Windows), Proventia Network IPS, BlackICE Agent for Server, Proventia Network IDS, Proventia-G 1.1 and earlier, IBM Security Host Protection for Desktops, Virtual Server Protection for Vmware, IBM Security Host Protection for Servers (Unix):
This signature detects a Windows Mite backdoor running on your network. This backdoor is typically seen on port 65530/TCP.
IBM Security Network Protection: 5.1, Proventia Network MFS: XPU 1.37, RealSecure Server Sensor: XPU 22.37, Proventia Server IPS for Linux technology: 1.0, IBM Security Host Protection for Servers (Windows): 1.0.914.0, Proventia Network IPS: XPU 1.42, BlackICE Agent for Server: 3.6eof, Proventia Network IDS: XPU 22.37, Proventia-G 1.1 and earlier: XPU 22.37, IBM Security Host Protection for Desktops: 8.0.614.1, Virtual Server Protection for Vmware: 1.0, IBM Security Host Protection for Servers (Unix): 2.2.2, IBM Security Host Protection for Servers (Windows): 188.8.131.520
Unauthorized Access Attempt
Windows Mite, also known asBackdoor.WindowsMite.10, Backdoor.WindowsMite.10 Backdoor.WinMite and BackDoor-EB, is a backdoor Trojan affecting Microsoft Windows operating systems. The backdoor uses a client/server relationship, where the server component is installed in the victim's system and the remote attacker has control of the client. The server attempts to open a port, typically TCP port 65530, to allow the client system to connect. Windows Mite backdoor could allow a remote attacker to gain unauthorized access to the system.
Use an up-to-date antivirus program to determine if the target computer is host to a backdoor program. If the program detects a backdoor, follow its instructions to disinfect and repair the computer.
PestPatrol Web site
Windows Mite 1.0
Windows Mite backdoor