Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Excessive unauthorized remote access atempts

This morning and throughout the day this is how my console looked:

User uploaded file


My machine became unresponsive at times up to the point that I had to hard-restart it twice. Before today I hadn't noticed any weird activity like this, I looked up some of the ip addresses that appeared there and all of them were marked as malicious ip's.


Is there anything I can do to prevent this other than shutting down the vnc access? Is logmein a better/safer option? I need to connect to my machine remotely almost on a daily basis.


Why this started happening to my machine all of the sudden? is not like I keep highly classified info on that computer, is a common occurrence and I shouldn't worry? All the attempts are failed, but it got to a point where I'm getting more than one per second, so I guess that's what caused my machine to crash.


Any help will be greatly appreciated.

iMac (27-inch Mid 2011), OS X Mavericks (10.9.4)

Posted on Sep 5, 2014 7:15 PM

Reply
5 replies

Sep 5, 2014 8:51 PM in response to dcabs

As Linc has said, you should not expose open ports to the internet. Script Kiddies (and other malware) have found that your system is responding to connection requests, and they are trying to break in. Now that they have found you, they will continue to try until the heat death of the universe.


And VNC is the worst if you have enabled VNC viewers may control screen with password: xxxxxxxxx


as that does not even require they know the username, they can just bombard the VNC server with password after password attempt.


If you cannot use Back-to-My-Mac via iCloud, then you need to at the very minimum start playing games with what port you expose, and stop exposing 5900. This can be done, and it is not security, but it makes your VNC port a non-common one and harder to discover. You have the router port forward some high numbered internet port to your Mac's port 5900, and then you make your VNC connection to the high numbered port


vnc://address.of.your.mac:65432


assuming you choose 65432 as you high numbered port. You may need to change this port from time to time if the script kiddies find you again.


However, Back-to-My-Mac would be much better than exposing your VNC port directory to the internet.


The other possibility is to use an SSH tunnel, which is both secure and you can play the same high number port games for ssh as I just suggested for VNC. ssh tunnels are even more complicated to setup, so strongly suggest back-to-my-mac.

Sep 5, 2014 10:56 PM in response to BobHarris

Thank you guys. I'm also using Back to my Mac (at least the screen sharing app) but I set it up manually, but I keep the vnc option because often times I need to access using my phone instead of my laptop, as far as I know I can't use Back to my Mac with iOS.

I used logmein before but switched to vnc when they canceled the free version, would it be preferable to go back to that or something similar like teamviewer?

If you don't mind I have a few extra questions that perhaps you can help me figure out.

What would happen if I enable the stealth mode, would that help?

I tried to add a ssh key this morning but couldn't, as you probably noticed I'm far from an expert on this thing, I'll check a tutorial on that anyway.


Finally, I noticed the ip addresses trying to access me are from all over, Chile, Netherlands, USA, etcetera, Why is that? did someone find out my machine and shared the address in an online hacker forum or something like that?

So far all the attempts have failed, are they just throwing random words until they guess the password? They also don't know the username, so I guess they need to figure that too.


Thanks a lot for your help.

Sep 6, 2014 3:58 AM in response to dcabs

For your iOS device switch to TeamViewer.com. It is free for personal use, and close the VNC port porwarding on your router.


ssh is a wonderful tool, but it is not easy to setup and very picky about a lot of little details, that if not just right, ssh will not do what you ask, because it feels the setup is not secure. That is good, but a pain to get it right. Getting an ssh tunnel with VNC running over it from an iOS device is a function of the VNC client.


TeamViewer will be easier.


The probes are coming from bot networks. Thousands of compromised Windows systems that their oowners do not know are part if a bot network. The bit network scans the internet looking for IP addresses with well open standard ports (VNC, Windows RDC, AFP/CIFS/SMB file sharing, ssh, etc…), and when they find them, they pass the IP addresses to the other bots. Then they pound on the open ports.


Stealth mode on your router only works if you do not have any open ports that are responding to requests, such as your VNC port 5900. Also stealth mode is most useful when they do not know you exist. Now that they have found a responding IP address, they will have you on their list for awhile.


However, going to stealth after closing all open ports on your router, will mean it will have to do less work on each bot probe, as in stealth mode it does not need to respond, saving it some effort, that it can devote to your network traffic. But you need to get those ports closed. You can use the Shields Up service at <http://www.grc.com> To scan your router and verify if you have closed all ports and are in stealth mode.


If you do not switch to TeanViewer, then at least have your router forward a high numbered port of your choosing to port 5900 on your Mac, have the iOS device specify that port when making VNC connections. It is not as good as using TeamViewer, but better than having a well known port open on your router.

Excessive unauthorized remote access atempts

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.