<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This was resolved in the 2016 in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933673#M1895</link>
    <description>&lt;P&gt;This was resolved in the 2016-09-30 SRU.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matthew Franks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Oct 2016 18:27:51 GMT</pubDate>
    <dc:creator>Matthew Franks</dc:creator>
    <dc:date>2016-10-05T18:27:51Z</dc:date>
    <item>
      <title>MALWARE-CNC Osx.Trojan.Keydnap variant dropper detected</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933661#M1868</link>
      <description>&lt;P&gt;I'm getting this email notification, but I don't know if this is just a notification or if the network is in danger.&lt;/P&gt;
&lt;P&gt;here is what the exact email says.&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;[1:40268:1] "MALWARE-CNC Osx.Trojan.Keydnap variant dropper detected" [Impact: Vulnerable] From "xx.xxx.x.xxx" at Mon Sep 26 17:52:05 2016 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} 104.47.37.73:15269 (united states)-&amp;gt;xx:xxx:xxx:xxx:25 (unknown).&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;Is&amp;nbsp; my network being compromised, or is this just a notification that it stopped the malware?&amp;nbsp; I've been getting this email notification consistently today, and we've never had an issue before.&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;thanks,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000" face="Times New Roman"&gt; &lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933661#M1868</guid>
      <dc:creator>svillagrana</dc:creator>
      <dc:date>2020-02-21T05:02:01Z</dc:date>
    </item>
    <item>
      <title>Hello svillagrana</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933662#M1870</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: Symbol;"&gt;&lt;SPAN style="font: 7.0pt 'Times New Roman';"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/svillagrana" title="View user profile." class="username" lang="" about="/users/svillagrana" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;svillagrana&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The intrusion event is alerting you that the Firepower sensor is seeing traffic matching this intrusion rule in your network traffic.&lt;/P&gt;
&lt;P&gt;More information regarding this specific Malware can be found below:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://virustotal.com/en/file/64cc212853359ec2164ceb142961db25452e576a94bc1e092417eb4cd2bf9186/analysis/" style="text-indent: -0.25in;"&gt;https://virustotal.com/en/file/64cc212853359ec2164ceb142961db25452e576a94bc1e092417eb4cd2bf9186/analysis/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-indent: -0.25in;"&gt;Here is some additional information regarding the malware: &lt;/SPAN&gt;&lt;A href="http://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/" style="text-indent: -0.25in;"&gt;http://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So the rule is written to detect traffic matching malicious network traffic associated with this Malware in traffic coming from $EXTERNAL_NET (IP addresses external to your local subnet) going to your SMTP servers to TCP Port 25 (SMTP).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You would need to investigate the source of this traffic and why you would be receiving such traffic directed at your Mail servers.&lt;/P&gt;
&lt;P&gt;The intrusion event would also have a packet capture&amp;nbsp;available with the packet that triggered the intrusion event for further analysis.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 18:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933662#M1870</guid>
      <dc:creator>kwalcott</dc:creator>
      <dc:date>2016-09-26T18:42:59Z</dc:date>
    </item>
    <item>
      <title>We opened a case with Cisco</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933663#M1871</link>
      <description>&lt;P&gt;We opened a case with Cisco TAC and the FirePower team replied that this had been identified as false-positive.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 06:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933663#M1871</guid>
      <dc:creator>Yonglu Jian</dc:creator>
      <dc:date>2016-09-28T06:52:03Z</dc:date>
    </item>
    <item>
      <title>So what can I do about the</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933664#M1873</link>
      <description>&lt;P&gt;So what can I do about the &amp;nbsp;50+ email notifications that I'm getting per day and throughout the night?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 07:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933664#M1873</guid>
      <dc:creator>svillagrana</dc:creator>
      <dc:date>2016-09-28T07:49:56Z</dc:date>
    </item>
    <item>
      <title>We are getting the same</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933665#M1875</link>
      <description>&lt;P&gt;We are getting the same messages from our FirePower system.&lt;/P&gt;
&lt;P&gt;So do we just disable the signature or what is the proposed solution from TAC?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are they fixing their IPS Signatures and we update?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for a reply&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 08:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933665#M1875</guid>
      <dc:creator>ale</dc:creator>
      <dc:date>2016-09-28T08:53:32Z</dc:date>
    </item>
    <item>
      <title>Hi svillagrana,</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933666#M1877</link>
      <description>&lt;P&gt;Hi svillagrana,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In the last couple of days there has been a lot of reports of &lt;FONT color="#000000" face="Calibri"&gt;1:40268:1&lt;/FONT&gt; (Rev 1 ) firing on email signature jpg images and as a result the rule has been modified and is pending review. A new revision of the rule (Rev 2) will be available in future SRU updates.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That said, as Kevon advised you might want to investigate this internally to determine if this is FP or not. If this is firing on outgoing emails signature jpg images, chances are it could be FP. However, events on incoming emails should be further investigated internally to determine if its from a trusted source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please feel free to contact Firepower TAC for further queries.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;~ Binyam&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 09:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933666#M1877</guid>
      <dc:creator>Binyam Demissie</dc:creator>
      <dc:date>2016-09-28T09:29:56Z</dc:date>
    </item>
    <item>
      <title>We have the same trouble and</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933667#M1881</link>
      <description>&lt;P&gt;We have the same trouble and also just opened a case. Hopefully they already have the new&amp;nbsp;SRU&amp;nbsp;update if ours is determined to be a false-positive.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 16:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933667#M1881</guid>
      <dc:creator>Jacques Brouwers</dc:creator>
      <dc:date>2016-09-28T16:06:56Z</dc:date>
    </item>
    <item>
      <title>Below is their response.</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933668#M1885</link>
      <description>&lt;P&gt;Below&amp;nbsp;is their response. However there is no ETA for the new SRU. We have decided to leave the rule in-place and just delete the 100+ messages per day until it is resolved.&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------&lt;/P&gt;
&lt;P&gt;Action Plan: Explain issues with 40268&lt;/P&gt;
&lt;P&gt;Our research team TALOS has confirmed that recently released SID&amp;nbsp;1:40268:1 is generating false positives for customers.&lt;/P&gt;
&lt;P&gt;A new revision is going through the QA process now and we expect it to be released in one of the next SRU updates. For the time being, you can set 40268 to generate events only or disable it until the new revision is out.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 16:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933668#M1885</guid>
      <dc:creator>Jacques Brouwers</dc:creator>
      <dc:date>2016-09-28T16:21:04Z</dc:date>
    </item>
    <item>
      <title>Hi all</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933669#M1888</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;I have the same issue here. We are investigating but looks like a &amp;nbsp;FP. &amp;nbsp;We will wait the next SRU to correct this FP.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thx,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;~Pablo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 17:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933669#M1888</guid>
      <dc:creator>Hypermarcas SA</dc:creator>
      <dc:date>2016-09-28T17:20:13Z</dc:date>
    </item>
    <item>
      <title>Hello Team,</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933670#M1890</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;Please disable the signature as the new release of SRU will be out soon.&lt;/P&gt;
&lt;P&gt;Rate and mark correct if the post helps you.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Jetsy&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 17:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933670#M1890</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2016-09-28T17:23:47Z</dc:date>
    </item>
    <item>
      <title>"However, events on incoming</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933671#M1891</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"However, events on incoming emails should be further investigated..."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All of mine are incoming. The rule is written to trigger on incoming SMTP. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My question is, if the rule is creating false positives, will it also create a true positive for a malicious attacks? If the rule will not trigger a true positive than I will disable the rule.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2016 23:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933671#M1891</guid>
      <dc:creator>s.buskus</dc:creator>
      <dc:date>2016-09-28T23:11:57Z</dc:date>
    </item>
    <item>
      <title>As of SRU number: 2016-09-28</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933672#M1893</link>
      <description>&lt;P&gt;As of SRU number: 2016-09-28-001, no change. We have moved this to Alert only. Much of the traffic was from customers we have had for a long time. We will continue to monitor, but I believe everything we are seeing is FP at this point.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2016 21:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933672#M1893</guid>
      <dc:creator>rwoolery1</dc:creator>
      <dc:date>2016-09-29T21:25:05Z</dc:date>
    </item>
    <item>
      <title>This was resolved in the 2016</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933673#M1895</link>
      <description>&lt;P&gt;This was resolved in the 2016-09-30 SRU.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Matthew Franks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 18:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-cnc-osx-trojan-keydnap-variant-dropper-detected/m-p/2933673#M1895</guid>
      <dc:creator>Matthew Franks</dc:creator>
      <dc:date>2016-10-05T18:27:51Z</dc:date>
    </item>
  </channel>
</rss>

