Event ID - 3128

Port No3128
Service NameREVTUNNEL
RFC Doc0
ProtocolTCP
DescriptionThis memory-resident, Perl script backdoor tool allows a malicious user to modify any of the following configuration settings:

HTTP Mode (Get/Post)
Port to listen to
Server
Shell
Delay Time
Time
Daily
It can either act as a master or a slave, depending on the parameters used. As a slave, its sole purpose is to connect to its master, and to wait for and execute commands. As a master, on the other hand, it listens to a hardcoded port 16386, which can be modified manually. This backdoor tool runs on Unix and is written in Perl.
Reference LinkREVTUNNEL
AttackSolution:
This procedure terminates the running malware process. You will need the name(s) of the file(s) detected earlier.
Login to the console using a valid username and password
Use ps command to list running processes in memory
In the list of running programs*, locate the malware file or files detected earlier and take note of their process IDs.
Using the kill command, terminate all process related to the malware detected earlier using the process IDs.
Example: kill 2122
Note: 2122 is only a sample process ID for the malware

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.