eBay Port Scan

When visiting the eBay.com site, a script will run that performs a local port scan of your computer to detect remote support and remote access applications.

Many of these ports are related to remote access/remote support tools such as the Windows Remote Desktop, VNC, TeamViewer, Ammy Admin, and more. 

After learning about this, BleepingComputer conducted a test and can confirm that eBay.com is indeed performing a local port scan of 14 different ports when visiting the site.

eBay.com script performing a port scan
eBay.com script performing a port scan

This scan is being conducted by a check.js script [archived] on eBay.com that attempts to connect to the following ports:

Ports being scanned
Ports scanned by the script

The fourteen different ports that are scanned and their associated programs and eBay reference string is listed below.

Program Ebay Name Port
Unknown REF 63333
VNC VNC 5900
VNC VNC 5901
VNC VNC 5902
VNC VNC 5903
Remote Desktop Protocol RDP 3389
Aeroadmin ARO 5950
Ammyy Admin AMY 5931
TeamViewer TV0 5939
TeamViewer TV1 6039
TeamViewer TV2 5944
TeamViewer TV2 6040
Anyplace Control APC 5279
AnyDesk ANY 7070

BleepingComputer has not been able to identify the targeted program on port 63333. If you recognize it, please let us know.

The script performs these scans using WebSockets to connect to 127.0.0.1, which is the local computer, on the specified port.

Script to use websockets to perform local port scans
Script to use WebSockets to perform local port scans

According to Nullsweep, who first reported on the port scans, they do not occur when browsing the site with Linux.

Once they tested in Windows, though, the port scans occurred.

This makes sense as the programs being scanned for are all Windows remote access tools.

Likely done to detect hacked computers

We first heard about eBay's port scanning script from Jack Rhysider of DarkNetDiaries, and it was theorized that it was being done for ad delivery, fingerprinting, or fraud protection.

As the port scan is only looking for Windows remote access programs, it is most likely being done to check for compromised computers used to make fraudulent eBay purchases.

In 2016, reports were flooding in that people's computers were being taken over through TeamViewer and used to make fraudulent purchases on eBay.

As many eBay users use cookies to automatically login to the site, the attackers were able to remote control the computer and access eBay to make purchases.

It got so bad that one person created a spreadsheet to keep track of all the reported attacks. As you can see, many of them reference eBay.

The script being used for fraud detection is further confirmed by Dan Nemec's great write-up, where he traced it to a fraud detection product owned by LexisNexis called ThreatMetrix.

As part of ThreatMetrix's description, they discuss how they detect and protect sites from Remote Access Trojans (RATs).

"Malware protection helps businesses mitigate the risk by being protected from Man-In-The-Browser (MITB), Remote Access Trojan (RAT), high velocity/frequency bot attacks to low-and- slow attacks mimicking legitimate customer behavior, ransomware, key logging attempts, etc," ThreatMetrix's product page explains.

While the scanned for programs are all legitimate, some of them have been used as RATs in phishing campaigns.

Regardless of the reasons, port scans like this are still intrusive and not something that many users would want to happen when visiting a site.

When we reached out to eBay for statement we were told:

"Our customers’ privacy and data remains a top priority. We are committed to creating an experience on our sites and services that is safe, secure, and trustworthy."

Update 5/25/20 12:01 AM EST: Updated article with correct attribution.
Update 5/25/20 12:28 PM EST: Updated article with further info from Dan Nemec's blog post about the port scans.
Update 5/25/20 01:25 PM EST: Added ebay's statement.

Related Articles:

TeamViewer's corporate network was breached in alleged APT hack

TeamViewer links corporate cyberattack to Russian state hackers

CEO who sold fake Cisco devices to US military gets 6 years in prison

CEO charged with sale of counterfeit Cisco devices to govt, health orgs