<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple false positive events for wscript.exe in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5004176#M8104</link>
    <description>&lt;P&gt;Check the wscript.exe alert event details! (Detected as w32.4173FC5A68.infostealer-psexec.talos.sso)&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;See Annoucements Sections (Secure Endpoint)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;False Positive Detections&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important Issue&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Cisco is aware of the false positive detection(s) related to Cloud IOC: ExecutedMalware.ioc or Threat Name: w32.4173FC5A68.infostealer-psexec.talos.sso. The SHA256 involved is 4173fc5a6864f03ab021823cd0f2f085ba85b3a9b1e37a2094798fc099507523. The disposition is being reviewed and Cisco is investigating the root cause. We apologize for any inconvenience this may have caused.&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jan 2024 06:38:12 GMT</pubDate>
    <dc:creator>RalphNelson</dc:creator>
    <dc:date>2024-01-24T06:38:12Z</dc:date>
    <item>
      <title>Multiple false positive events for wscript.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5003960#M8103</link>
      <description>&lt;P&gt;Today we are seeing multiple high severity events being generated for wscript.exe sha256:&amp;nbsp;4173fc5a6864f03ab021823cd0f2f085ba85b3a9b1e37a2094798fc099507523&lt;/P&gt;
&lt;P&gt;This is affecting multiple versions of the connector which is causing multiple endpoints to be placed into isolation.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this a false positive/misclassification?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 20:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5003960#M8103</guid>
      <dc:creator>mski7861</dc:creator>
      <dc:date>2024-01-23T20:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple false positive events for wscript.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5004176#M8104</link>
      <description>&lt;P&gt;Check the wscript.exe alert event details! (Detected as w32.4173FC5A68.infostealer-psexec.talos.sso)&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;See Annoucements Sections (Secure Endpoint)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;False Positive Detections&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important Issue&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Cisco is aware of the false positive detection(s) related to Cloud IOC: ExecutedMalware.ioc or Threat Name: w32.4173FC5A68.infostealer-psexec.talos.sso. The SHA256 involved is 4173fc5a6864f03ab021823cd0f2f085ba85b3a9b1e37a2094798fc099507523. The disposition is being reviewed and Cisco is investigating the root cause. We apologize for any inconvenience this may have caused.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 06:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5004176#M8104</guid>
      <dc:creator>RalphNelson</dc:creator>
      <dc:date>2024-01-24T06:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple false positive events for wscript.exe</title>
      <link>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5004177#M8105</link>
      <description>&lt;P&gt;This is FP. Cisco is aware of this. This is what they sent&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cisco is aware of the false positive detection(s) related to Cloud IOC: ExecutedMalware.ioc or Threat Name: w32.4173FC5A68.infostealer-psexec.talos.sso. The SHA256 involved is 4173fc5a6864f03ab021823cd0f2f085ba85b3a9b1e37a2094798fc099507523. The disposition is being reviewed and Cisco is investigating the root cause. We apologize for any inconvenience this may have caused.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 06:35:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/multiple-false-positive-events-for-wscript-exe/m-p/5004177#M8105</guid>
      <dc:creator>muncky1</dc:creator>
      <dc:date>2024-01-24T06:35:34Z</dc:date>
    </item>
  </channel>
</rss>

