Testing Blue Iris, new W7 Pro system build, test purposes only. Put on separate router with separate public IP address so it was isolated from everything else on the LAN. Enabled port forwarding to allow me to connect via the public address. Worked fine, BI seemed like a go project. We are replacing an old 8 (analog) camera system on a dedicated DVR. Only connections on that LAN is via VPN.
After a few days of operation, I realized that there were 2 new users on the system. "Admin" and "Reptal", both with administrator privileges and a registry entry that removed them from the log on screen (so they could not be seen at login), but as administrators they could be remotely logged in (port forwarding). The Admin account was created first and the other about a half hour later. I discovered this about 15 minutes after Reptal was created. The event logs and whois indicated that the connection was from New Caledonia (NC). Was mostly just curious about it because it is an isolated system on an isolated network. I have an image of the system, so recovery is simple. Further review of System Event Logs showed that IP address being disconnected from Remote Desktop. I am still evaluating logs and have my theories but nothing really concrete yet (other than IP of intruder, could be faked).
So far, note to self:
1. Set up your camera with it disconnected from the Internet.
2. Turn off P2P.
3. Change password and user ID if you can.
4. Do not use the same password on your camera, PC or BI.
5. Make sure your tin foil hat does not have any holes in it.
6. Oh yeah, listen to these people and use VPN if you have to Internet.
Mine was a careless operation but I didn't care since it was isolated and only for a max of 20 days for evaluation.
Don't be careless.
--
The universe is composed of electrons, neutrons, protons and......morons.
¯\_(ツ)_/¯
After a few days of operation, I realized that there were 2 new users on the system. "Admin" and "Reptal", both with administrator privileges and a registry entry that removed them from the log on screen (so they could not be seen at login), but as administrators they could be remotely logged in (port forwarding). The Admin account was created first and the other about a half hour later. I discovered this about 15 minutes after Reptal was created. The event logs and whois indicated that the connection was from New Caledonia (NC). Was mostly just curious about it because it is an isolated system on an isolated network. I have an image of the system, so recovery is simple. Further review of System Event Logs showed that IP address being disconnected from Remote Desktop. I am still evaluating logs and have my theories but nothing really concrete yet (other than IP of intruder, could be faked).
So far, note to self:
1. Set up your camera with it disconnected from the Internet.
2. Turn off P2P.
3. Change password and user ID if you can.
4. Do not use the same password on your camera, PC or BI.
5. Make sure your tin foil hat does not have any holes in it.
6. Oh yeah, listen to these people and use VPN if you have to Internet.
Mine was a careless operation but I didn't care since it was isolated and only for a max of 20 days for evaluation.
Don't be careless.
--
The universe is composed of electrons, neutrons, protons and......morons.
¯\_(ツ)_/¯