Event ID - 4653

Port No4653
Service NameCero
RFC Doc0
ProtocolTCP
DescriptionCero Spam uses the Captcha method. This method displays an image in your form and ask the user to fill in a field with the showed code. The image looks like this.
When your form is submitted its content is sent to Cero Spam where the code is validated. This filters out all spambot generated content.
Reference LinkMore Information
AttackName:Cero 1.0

Backdoor Cero b1 is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely perform a variety of operations, such as changing the registry, executing commands, starting services, listing files, and uploading or downloading files. Cero b1 uses port 4653 via TCP.

To implement Cero Spam solution you just need to:
1) create a new form item (log in or sign up) in the admin area of Cero Spam;
2) change the "action" property of your form to a URL we provide;
3) add a new text field to your form (where the user will fill in the code appearing in the security image) and a small portion of code above it.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.