My ISP did move me from a dynamic IP to a fixed IP, but the attacks continued. I have run exhaustive antivirus...
and antispyware checks on my LAN comps, which are all clean. I run ESET on the PCs and have a local server, although the server was not online when I changed IP address. How can this happen, and do you have any suggestions?
The attacks are most likely targeting a large number of IPs or networks so changing your IP will not stop the scans because the attackers will eventually scan your new IP.
If you still think that your systems are under targeted attacks or have other evidence of a kernel intrusion attack, your next step should be examining the network traffic in more depth. You may want to scan your systems with different antimalware software than you are currently using or perform the scans in safe mode, Monitoring for unexpected network traffic can help determine if systems have some type of malware that is stopping the antimalware software from working.
Make sure you have the appropriate authorization to monitor your network. There are a number of open source tools that can be used for network monitoring by simply running a bootable live CD off an unused computer. You may want to monitor your network for a couple days to get a good sample of traffic to analyze, but the more traffic you capture, the more effort it will be to analyze the data. Look for traffic originating from one of your computers when it's not in use. You will most likely see some traffic to Microsoft, your antimalware vendor for updates or new antimalware definitions, or other similar legitimate background operations. You may want to start with a short time period to get a sense of the network traffic on your network and then expand from there. You will need to mirror or get a copy of the traffic to the computer doing the monitoring so you can analyze the traffic and determine if anything suspicious is traversing your network.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Nick Lewis
The SFG malware dropper can bypass antimalware programs and exploit two patched vulnerabilities. Expert Nick Lewis explains how to these attacks work...continue reading
Darkleech campaigns have taken a new form and have now stopped using obfuscated script. Expert Nick Lewis explains the changes in Darkleech ...continue reading
The remote administration Ammyy Admin software was repeatedly found to be spreading different types of malware. Expert Nick Lewis explains how ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.