Event ID - 6000

Port No6000
Service Namex11
RFC Doc0
ProtocolTCP
DescriptionX-Window System. X11 ports to support remote x-windows sessions. Sessions are vulnerable to spoofing, session hijacking, capture of user screen data, keystroke monitoring, insertion of hostile keystrokes & commands, data diddling, and DOS. Review x-windows security techniques; do not run default x-windows server config's in production environment!.
Reference LinkMore Information
AttackName:NetBus

BO can be removed by deleting the server and removing its registry entry. If possible, you should back up all user data, format your hard drive, and reinstall all operating systems and software on the infected machine. However, if someone has installed BO on your machine, then it is most likely part of a larger security breach. You should act according to your site security policy.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.