<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 25 Compromise host-FTD/FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403224#M1080797</link>
    <description>&lt;P&gt;Firepower will both block the CNC traffic as well as alert you to the hosts generating it. It is useful to remediate the endpoints so that they are no longer a source of traffic that needs to be blocked. The CNC compromise on them may have other effects that aren't apparent on the firewall (lateral movement in the network, potential for a more serious breach if the device is mobile and goes off-network at some point, etc.)&lt;/P&gt;</description>
    <pubDate>Fri, 14 May 2021 16:52:39 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-05-14T16:52:39Z</dc:date>
    <item>
      <title>25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403164#M1080789</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;Getting Alarm for 25 Host compromised by SI system of FTD/FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source of the hit is showing CNC.. which is already blocked by the policy..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure then why compromised host is showing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This&amp;nbsp; devices are not there in prefilter policy..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer don't have Malware license..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco FMC 6.4.0 version&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly advise the next action or suggestion..&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 15:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403164#M1080789</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-05-14T15:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: 25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403224#M1080797</link>
      <description>&lt;P&gt;Firepower will both block the CNC traffic as well as alert you to the hosts generating it. It is useful to remediate the endpoints so that they are no longer a source of traffic that needs to be blocked. The CNC compromise on them may have other effects that aren't apparent on the firewall (lateral movement in the network, potential for a more serious breach if the device is mobile and goes off-network at some point, etc.)&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 16:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403224#M1080797</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-14T16:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: 25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403364#M1080803</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In view of that.. how should we confirm the followings:-&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;no connections established between CnC and inside IP’s.&lt;/LI&gt;&lt;LI&gt;FW performing as designed in response to malicious connection attempts by dropping traffic even though we don't have malware license in FMC, but we are seeing traffic is block in between.&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;CnC alerts are a false alarm with no exposure to the customer base.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Anil Singh&lt;/P&gt;</description>
      <pubDate>Sat, 15 May 2021 02:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403364#M1080803</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-05-15T02:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: 25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403650#M1080811</link>
      <description>&lt;P&gt;It's not a false alarm - FMC is showing you that it blocked (dropped) an attempted CnC connection.&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 02:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403650#M1080811</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-16T02:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: 25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403667#M1080813</link>
      <description>&lt;P&gt;ok, I got it..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Was also going through the below thread about the same subject line..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/endpoint-security/category-cnc-connected-event-type-intrusion-event-malware-cnc/m-p/3227116/highlight/true" target="_blank"&gt;Category=CnC Connected, Event Type=Intrusion Event - malware-cnc - Cisco Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/firepower-blocking-cnc/td-p/3051975" target="_blank"&gt;Solved: Firepower blocking CnC - Cisco Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/the-host-may-be-under-remote-control/m-p/3203475" target="_blank"&gt;Solved: Re: The host may be under remote control - Cisco Community&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my plan is :-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To&amp;nbsp;&amp;nbsp;run NMAP Scan on the client and from FMC and check any open ports &amp;nbsp;that are there at the client side etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Similarly, we need to advise the local IT team to scan the such clients for virus and malware.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to monitor any additional alerts from the same client (host profile).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;lookup destination ip whois, talos intelligence.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We need to do this exercise with all compromise hosts..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other suggestion from you!!&lt;/P&gt;</description>
      <pubDate>Sun, 16 May 2021 07:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403667#M1080813</guid>
      <dc:creator>anilkumar.cisco</dc:creator>
      <dc:date>2021-05-16T07:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: 25 Compromise host-FTD/FMC</title>
      <link>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403872#M1080823</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/166962"&gt;@anilkumar.cisco&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;I don't think scanning with nmap will help much since the nature of CnC communications is that the communications are usually initiated from the infected host to the CnC server(s). As such, it will use an ephemeral port (i.e. 1025-65534) and not show up as an open port tom an external scan).&lt;/P&gt;
&lt;P&gt;Your steps 2-4 look pretty good.&lt;/P&gt;</description>
      <pubDate>Mon, 17 May 2021 03:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/m-p/4403872#M1080823</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-17T03:01:03Z</dc:date>
    </item>
  </channel>
</rss>

