<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Malware-Other dns request with long hostname segment detected in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3193536#M4442</link>
    <description>&lt;P&gt;HI all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have noticed that I have many drops in Firesight Management Centre connection table.&lt;/P&gt;
&lt;P&gt;The drops are between my Internal DNS and ISP's dns servers.&lt;/P&gt;
&lt;P&gt;They are documented as "Malware-Other dns request with long hostname segment - possible data exfiltration attempt"&lt;/P&gt;
&lt;P&gt;Periodically i have DNS issues where internal clients web browsing is slow of fails altogether.&lt;/P&gt;
&lt;P&gt;Im unsure whether the browing issues are related to the connection table drops.&lt;/P&gt;
&lt;P&gt;Any thoughts would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ian&lt;/P&gt;</description>
    <pubDate>Sat, 09 Mar 2019 01:44:36 GMT</pubDate>
    <dc:creator>iwearing</dc:creator>
    <dc:date>2019-03-09T01:44:36Z</dc:date>
    <item>
      <title>Malware-Other dns request with long hostname segment detected</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3193536#M4442</link>
      <description>&lt;P&gt;HI all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have noticed that I have many drops in Firesight Management Centre connection table.&lt;/P&gt;
&lt;P&gt;The drops are between my Internal DNS and ISP's dns servers.&lt;/P&gt;
&lt;P&gt;They are documented as "Malware-Other dns request with long hostname segment - possible data exfiltration attempt"&lt;/P&gt;
&lt;P&gt;Periodically i have DNS issues where internal clients web browsing is slow of fails altogether.&lt;/P&gt;
&lt;P&gt;Im unsure whether the browing issues are related to the connection table drops.&lt;/P&gt;
&lt;P&gt;Any thoughts would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Sat, 09 Mar 2019 01:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3193536#M4442</guid>
      <dc:creator>iwearing</dc:creator>
      <dc:date>2019-03-09T01:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Malware-Other dns request with long hostname segment detected</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3195517#M4444</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think both would be related. Because if your internal DNS server is doing recursive query to your ISP DNS server which might be getting blocked, slow internet for users whose queries aren't solved would be expected.&lt;/P&gt;
&lt;P&gt;Also the rule&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="entry-table" cellspacing="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;rule&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;alert udp $HOME_NET any -&amp;gt; $EXTERNAL_NET 53 (msg:"MALWARE-OTHER dns request with long host name segment - possible data exfiltration attempt"; sid:30881; gid:3; rev:4; classtype:attempted-recon; metadata:engine shared, soid 3|30881, service dns; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;is a pre-processor rule so you might want to investigate and check why the traffic is being blocked in first place.&lt;/P&gt;
&lt;P&gt;Rate if its helpful.&lt;/P&gt;
&lt;P&gt;Yogesh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2017 08:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3195517#M4444</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2017-10-08T08:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Malware-Other dns request with long hostname segment detected</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3195834#M4445</link>
      <description>&lt;P&gt;Hi Yogesh,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The internal DNS servers are protected by Sophos and the server team are adamanet that there are no issues with the Internal DNS servers are blame Firesight for the DNS problems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Im unsure how to progress this and wonder whether I should disable this rule or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2017 08:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3195834#M4445</guid>
      <dc:creator>iwearing</dc:creator>
      <dc:date>2017-10-09T08:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Malware-Other dns request with long hostname segment detected</title>
      <link>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3196801#M4447</link>
      <description>&lt;P&gt;I too would like some further understanding as to why these happen in almost every deployment with this rule enabled in the IPS.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Oct 2017 01:35:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/malware-other-dns-request-with-long-hostname-segment-detected/m-p/3196801#M4447</guid>
      <dc:creator>g-rant</dc:creator>
      <dc:date>2017-10-11T01:35:17Z</dc:date>
    </item>
  </channel>
</rss>

