<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3373353#M5015</link>
    <description>Hello wwanjohi&lt;BR /&gt;&lt;BR /&gt;Also if you have installed AMP connectors on  those host , you can verify the device trajectory during the same time and see if there are any malicious activities going on.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Jetsy</description>
    <pubDate>Thu, 26 Apr 2018 06:36:33 GMT</pubDate>
    <dc:creator>Jetsy Mathew</dc:creator>
    <dc:date>2018-04-26T06:36:33Z</dc:date>
    <item>
      <title>Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3227116#M5012</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;On one of my host I see 3 threats&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp;&lt;STRONG&gt;Category&lt;/STRONG&gt;=CnC Connected, &lt;STRONG&gt;Event Type&lt;/STRONG&gt;=Intrusion Event - malware-cnc and &lt;STRONG&gt;Description&lt;/STRONG&gt;= The host may be under remote control.&lt;/P&gt;
&lt;P&gt;2.&lt;STRONG&gt; Category&lt;/STRONG&gt;&lt;SPAN&gt;=Impact 2 Attack,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Event Type&lt;/STRONG&gt;&lt;SPAN&gt;=&amp;nbsp;Impact 2 Intrusion Event - attempted-admin&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;SPAN&gt;= The host was attacked and is potentially vulnerable.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3.&amp;nbsp;&lt;STRONG&gt;Category&lt;/STRONG&gt;=Impact 2 Attack,&amp;nbsp;&lt;STRONG&gt;Event Type&lt;/STRONG&gt;=&amp;nbsp;Impact 2 Intrusion Event - attempted-user and&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;=&amp;nbsp;The host was attacked and is potentially vulnerable.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My question: How can i know if this is a real attack or if the threat has been blocked.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 20:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3227116#M5012</guid>
      <dc:creator>wwanjohi</dc:creator>
      <dc:date>2019-03-10T20:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3372614#M5013</link>
      <description>You should investigate on the reported host with some AV, or suspicious network traffic/processes</description>
      <pubDate>Wed, 25 Apr 2018 09:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3372614#M5013</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2018-04-25T09:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3372823#M5014</link>
      <description>&lt;P&gt;Look at Connections and/or Intrusion Event Tables and filter on that host IP address. Then look at whether the connection was allowed or blocked.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2018 13:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3372823#M5014</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-25T13:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3373353#M5015</link>
      <description>Hello wwanjohi&lt;BR /&gt;&lt;BR /&gt;Also if you have installed AMP connectors on  those host , you can verify the device trajectory during the same time and see if there are any malicious activities going on.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Jetsy</description>
      <pubDate>Thu, 26 Apr 2018 06:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3373353#M5015</guid>
      <dc:creator>Jetsy Mathew</dc:creator>
      <dc:date>2018-04-26T06:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3807002#M5016</link>
      <description>&lt;P&gt;I know this thread has some age, but I'm curious about your recommendation to "look at whether the connection was allowed or blocked."&amp;nbsp; I'm still relatively new with the FMC, but I can easily look at connections and intrusion events using the host IP; however, that's going to give me a huge list of connections, with many allowed and many blocked.&amp;nbsp; How can I relate any of those back to the logged intrusion event?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If it's reporting communication to a CnC, why doesn't it show the IP that triggered it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have to assume that if the device knows the target IP is a CnC server, that it would certainly block traffic to that host, but I've yet to find definitive evidence of that and feel like I need the IP in order to follow your recommendation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 17:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3807002#M5016</guid>
      <dc:creator>jranger_17</dc:creator>
      <dc:date>2019-02-21T17:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Category=CnC Connected, Event Type=Intrusion Event - malware-cnc</title>
      <link>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3807007#M5017</link>
      <description>&lt;P&gt;A blocked connection to a CnC server should normally show up under Security Intelligence events. It should be relatively easy to filter down that table to show only the host that was reported in the Intrusion event.&lt;/P&gt;
&lt;P&gt;If a given host has many different Blocked connections, it should be visited in person and remediated rather than try to ascertain everything remotely from FMC.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 17:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3807007#M5017</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-02-21T17:39:04Z</dc:date>
    </item>
  </channel>
</rss>

