<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have witnessed the same. A in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751475#M1026464</link>
    <description>&lt;P&gt;I have witnessed the same. A variety of different foreign countries are reported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Contents:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="margin-bottom: 0px; padding: 0px; font-size: 10.6667px; line-height: 16px; background-color: rgb(240, 244, 250);"&gt;
..............E....u@.@...S7A........W.XT..7..P..h........J...F.._..C.-..T....R|\..z...?...Pl&amp;lt;&amp;lt;9. .....WF.-..IPy~.Y..+!q...&amp;lt;.....n.
................0...0..R........0
..*.H..
.....0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS0..
070822065042Z.
120821065042Z0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS0..0
..*.H..
.........0..........
.'..tiz...I]u...=....H.P....%
wNu*;:.&amp;gt;.O%_.4o\.n.w...0......2....tt
..S.{.K.....N4*;.J....i}.p..|.*I.&amp;gt;..B*......p.,.(1.R..y........0..0...U......t.4...3];-.]..I.'...0....U.#.~0|..t.4...3];-.]..I.'....a._0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS...0...U....0....0
..*.H..
.........8.&amp;amp;...Z..........O.R.....MR@ G.^.."gh...rZ.a..D......U.b.B.p.....`....[../.Z.....c.3...p..L2..&amp;amp;.M.Q...J9j....`./........={&amp;gt;...kM...............F&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Aug 2015 23:15:25 GMT</pubDate>
    <dc:creator>Nicholas Penning</dc:creator>
    <dc:date>2015-08-20T23:15:25Z</dc:date>
    <item>
      <title>MALWARE-OTHER self-signed SSL certificate only allow from Source or To Destination?</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751474#M1026463</link>
      <description>&lt;P&gt;We have Recently setup the FireSIGHT Server and are now getting 100's of the&amp;nbsp;MALWARE-OTHER self-signed SSL certificate Alerts. &amp;nbsp; The Source and Destination IPs are from Nest's DropCam Services and our DropCams. &amp;nbsp;I'd like to Keep the system Alerting me to these kinds of events, though want it to Ignore the alerts when the destination is one of the 10 DropCams we have. &amp;nbsp;Any Suggestions on this would be great!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 10px; line-height: normal; font-family: 'Lucida Console';"&gt;Timestamp&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2015-08-12 10:37:23&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 10px; line-height: normal; font-family: 'Lucida Console';"&gt;Protocol &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : tcp&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 10px; line-height: normal; font-family: 'Lucida Console';"&gt;Alert Message&amp;nbsp; &amp;nbsp; : MALWARE-OTHER self-signed SSL certificate with default Internet Widgits Pty Ltd organization name (1:19551:6)&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 10px; line-height: normal; font-family: 'Lucida Console';"&gt;Session&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 52.6.210.94:443 -&amp;gt; 10.1.3.174:57446&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751474#M1026463</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2019-03-12T12:44:27Z</dc:date>
    </item>
    <item>
      <title>I have witnessed the same. A</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751475#M1026464</link>
      <description>&lt;P&gt;I have witnessed the same. A variety of different foreign countries are reported.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Contents:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="margin-bottom: 0px; padding: 0px; font-size: 10.6667px; line-height: 16px; background-color: rgb(240, 244, 250);"&gt;
..............E....u@.@...S7A........W.XT..7..P..h........J...F.._..C.-..T....R|\..z...?...Pl&amp;lt;&amp;lt;9. .....WF.-..IPy~.Y..+!q...&amp;lt;.....n.
................0...0..R........0
..*.H..
.....0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS0..
070822065042Z.
120821065042Z0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS0..0
..*.H..
.........0..........
.'..tiz...I]u...=....H.P....%
wNu*;:.&amp;gt;.O%_.4o\.n.w...0......2....tt
..S.{.K.....N4*;.J....i}.p..|.*I.&amp;gt;..B*......p.,.(1.R..y........0..0...U......t.4...3];-.]..I.'...0....U.#.~0|..t.4...3];-.]..I.'....a._0]1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd1.0...U...
TS Series NAS...0...U....0....0
..*.H..
.........8.&amp;amp;...Z..........O.R.....MR@ G.^.."gh...rZ.a..D......U.b.B.p.....`....[../.Z.....c.3...p..L2..&amp;amp;.M.Q...J9j....`./........={&amp;gt;...kM...............F&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 23:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751475#M1026464</guid>
      <dc:creator>Nicholas Penning</dc:creator>
      <dc:date>2015-08-20T23:15:25Z</dc:date>
    </item>
    <item>
      <title>I have opened a TAC Case for</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751476#M1026465</link>
      <description>&lt;P&gt;I have opened a TAC Case for this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Buried in the Policies, Intrusion Policy, Initial-Inline, Policy Layers, My Changes, Rules, Category, Malware-Other,&lt;/P&gt;&lt;P&gt;Select&lt;/P&gt;&lt;P&gt;SID&amp;nbsp;19551&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;MALWARE-OTHER self-signed SSL certificate with default Internet Widgits Pty Ltd organization name&lt;/P&gt;&lt;P&gt;Click &lt;STRONG&gt;Show Details &lt;/STRONG&gt;Button.&lt;/P&gt;&lt;P&gt;There is a Section Called Suppressions.&lt;/P&gt;&lt;P&gt;You can Suppress the Rule itself, or for Specific Source and Destinations.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I setup 2 Network Groups, one for the DropCams, one for the Already Blocked DropCam Servers. then created a Variable for each added those to the default set, then added as both the Source and Destination the Variables for the cameras and servers. &amp;nbsp; That didn't help the issue, though the TAC Engineer said it should of.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We Tried with Specific IP addresses vs the Variables/Groups and has the same results.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a Temp Fix to get the Cameras working we added an Access Control Policy that 'Trusted' &amp;nbsp;the Cams/Servers on Port 443 for both Source/Dest.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 23:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751476#M1026465</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2015-08-20T23:16:23Z</dc:date>
    </item>
    <item>
      <title>I understand the rule and the</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751477#M1026466</link>
      <description>&lt;P&gt;I understand the rule and the significance. The recommendation is to have the rule set to block. I am just trying to rule out a Dyre Trojan or any other type of malware using this. In this specific example it appears that the source IP is from Spain and according to the Firewall, its Skype; P2P communication.&lt;/P&gt;&lt;P&gt;I will have to do some more checking, but I believe this traffic is tied to using Consumer Skype. There are too many source/destinations to Suppress this rule so I might as well disable. I will keep it at Drop and Generate just to be on the safe side. But I would like to know how this packet looks when it is a known malware trying to use the certificate.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 23:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751477#M1026466</guid>
      <dc:creator>Nicholas Penning</dc:creator>
      <dc:date>2015-08-20T23:29:28Z</dc:date>
    </item>
    <item>
      <title>Interesting, Its only been</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751478#M1026467</link>
      <description>&lt;P&gt;Interesting, Its only been the DropCams that have triggered this rule for us. I guess I should feel Fortunate. (-;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2015 23:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751478#M1026467</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2015-08-20T23:33:43Z</dc:date>
    </item>
    <item>
      <title>I'm getting this alert too.</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751479#M1026469</link>
      <description>&lt;P&gt;I'm getting this alert too. &amp;nbsp;My alert doesn't seem to be tied to any particular application or country but keeps flagging for the same root CA. &amp;nbsp;Our own. &amp;nbsp;So I'm getting this alert more than a few times a day.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 13:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751479#M1026469</guid>
      <dc:creator>David.Weber1</dc:creator>
      <dc:date>2015-11-05T13:38:27Z</dc:date>
    </item>
    <item>
      <title>The Alert is really saying</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751480#M1026472</link>
      <description>&lt;P&gt;The Alert is really saying that a Device is communicating via SSL using a Gerneric Certificate that is not 'real' and is using a Test Certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think I ended up having to Disable the rule all together as the DropCams use &amp;nbsp;Amazons Elastic Computing and the IP Addresses kept changing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 13:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751480#M1026472</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2015-11-05T13:48:17Z</dc:date>
    </item>
    <item>
      <title>Yes also a problem with our</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751481#M1026473</link>
      <description>&lt;P&gt;Yes also a problem with our AWS servers. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2015 15:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751481#M1026473</guid>
      <dc:creator>David.Weber1</dc:creator>
      <dc:date>2015-11-05T15:19:35Z</dc:date>
    </item>
    <item>
      <title>Yes for me i am observing</title>
      <link>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751482#M1026474</link>
      <description>&lt;P&gt;Yes for me i am observing this signature from AT&amp;amp;T and Microsoft,Amazone AWS and many ...this is rule is very noise.&lt;/P&gt;
&lt;P&gt;what kind of attack the attacker can do, if i am not monitoring this kind of traffic(i mean if we disabled this rule SID:19551.?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 03:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/malware-other-self-signed-ssl-certificate-only-allow-from-source/m-p/2751482#M1026474</guid>
      <dc:creator>bachi.chow</dc:creator>
      <dc:date>2016-03-08T03:49:18Z</dc:date>
    </item>
  </channel>
</rss>

