Port No | 1054 |
Service Name | ACKCMD |
RFC Doc | 0 |
Protocol | TCP |
Description | This is a proof of concept backdoor malware. It allows a remote user access to an infected computer running on Windows 2000. It consists of a client component and a server component. A hacker uses the client component to communicate with the server component on the infected system. With the client program, the hacker can open a command prompt on the infected system. The hacker may communicate directly with the target system via certain firewall configurations. This backdoor hacking tool compromises network security. |
Reference Link | ACKCMD |
Attack | Solution: Scan your system with Trend Micro antivirus. Write down all the files detected as BKDR_ACKMD.A and then delete these files. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. Press CTRL+ALT+DEL simultaneously. The Windows Security dialog Box should appear. Click the Task Manager button to launch Windows Task Manager. Choose the Processes tab From the list of the running processes, locate the name of the backdoor processes. These are the file names, which you have written down. One at a time, select the backdoor processes, then click the End Process button. Again scan your system with Trend Micro antivirus and delete all files detected as BKDR_ACKCMD.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. XE |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.