<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When the Firepower Management Center shows an alert of a... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4898296#M1103226</link>
    <description>&lt;P&gt;Thanks for confirming my thoughts on this. I figured that these were blocked inbound attacks, however the way the alerts are worded it makes it sound like there's an active attack taking place.&lt;/P&gt;</description>
    <pubDate>Thu, 03 Aug 2023 15:35:44 GMT</pubDate>
    <dc:creator>mjoseph20</dc:creator>
    <dc:date>2023-08-03T15:35:44Z</dc:date>
    <item>
      <title>FMC Malware-CNC Win.Trojan Variant Outbound Connection</title>
      <link>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4887352#M1102752</link>
      <description>&lt;P&gt;Hi there everyone,&amp;nbsp; so over the last few weeks I've noticed and uptick in our FirePower devices sending alerts regarding about various malware/IOC's taking place on one of my web servers. My understanding when reading through these alerts is that someone (the source IP) is attempting to exploit my web server (destination host). I don't believe there to be an actual compromise of the server since the source are the&amp;nbsp; bad actors IP address. When I review the IOC's in FMC, it shows that FMC has dropped the traffic. Here's an example one my most recent attacks:&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;[1:47299:1] "MALWARE-CNC Win.Trojan.Remcos variant outbound connection" [Impact: Vulnerable] From "FTD" at Tue Jul 18 12:53:47 2023 UTC [Classification: A Network Trojan was Detected] [Priority: 1] {tcp} 139.59.183.83:34488 (united kingdom)-&amp;gt;172.21.x.x:80 (unknown).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In this case it's showing that that the source IP 139.59.183.83 is attempting to upload a network trojan to my web server 172.21.x.x over port 80 (we have https redirects in place). Now FMC shows that the inline result states the connection was dropped. Am I understanding this correctly, that the bad actors attempt to upload a network trojan was detected and dropped? And that this in fact an attack being attempted on my web server?&lt;/P&gt;&lt;P&gt;Or is it that something is on my web server is making an outbound call as based on the alert name "...outbound connection". I have reviewed the connection events related to the source IP and they are in-fact showing the inbound connection to my web server was blocked. I just need a bit of a sanity check to make sure my thought process that this attack began from the outside and was blocked by the FW's. I have found no evidence in the connection logs to suggest that the web server is making outbound calls to these malicious IP's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 22:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4887352#M1102752</guid>
      <dc:creator>mjoseph20</dc:creator>
      <dc:date>2023-07-18T22:45:17Z</dc:date>
    </item>
    <item>
      <title>When the Firepower Management Center shows an alert of a...</title>
      <link>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4892759#M1102990</link>
      <description>When the Firepower Management Center shows an alert of a detected and dropped network trojan, it means that the system has identified and blocked a network trojan threat. The intrusion event has been detected by the system and the network traffic containing the trojan has been dropped, preventing any further damage.&lt;BR /&gt;&lt;BR /&gt;The Firepower Management Center provides external alerting for such intrusion events, which can be via SNMP, syslog, and email. These alerts can be configured in the intrusion policy settings.&lt;BR /&gt;&lt;BR /&gt;- SNMP alerting can be enabled in the intrusion policy editor with individual rules configured to send SNMP alerts when they trigger. SNMP traps can be sent to a specified server, and SNMP v3 options are available by default for authentication and privacy.&lt;BR /&gt;&lt;BR /&gt;- Syslog alerting can also be enabled in the intrusion policy editor. Intrusion events can be sent to the managed device's syslog or to external syslog hosts. Facilities and priorities can be configured for the syslog alerts.&lt;BR /&gt;&lt;BR /&gt;- Email alerting can be configured in the Firepower Management Center's Policies ) Actions ) Alerts section. Specific rules or rule groups can be selected for email alerting. The email sender and recipients can be specified, and options for coalescing alerts and setting the maximum number of alerts per time interval are available. The alerts can also be configured for summary output displaying concise information about the intrusion events. &lt;BR /&gt;&lt;BR /&gt;From your comment "I have found no evidence in the connection logs to suggest that the web server is making outbound calls to these malicious IP's", it seems you are correct that the attack began from outside and was successfully blocked by your Firepower system.&lt;BR /&gt; &lt;BR /&gt;Sources:&lt;BR /&gt;[Firepower Management Center Configuration Guide, Version 6.0](&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Configuring_External_Alerting_for_Intrusion_Rules.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Configuring_External_Alerting_for_Intrusion_Rules.html&lt;/A&gt;)</description>
      <pubDate>Wed, 26 Jul 2023 10:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4892759#M1102990</guid>
      <dc:creator>Cisco_Virtual_Engineer</dc:creator>
      <dc:date>2023-07-26T10:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: When the Firepower Management Center shows an alert of a...</title>
      <link>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4898296#M1103226</link>
      <description>&lt;P&gt;Thanks for confirming my thoughts on this. I figured that these were blocked inbound attacks, however the way the alerts are worded it makes it sound like there's an active attack taking place.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Aug 2023 15:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-malware-cnc-win-trojan-variant-outbound-connection/m-p/4898296#M1103226</guid>
      <dc:creator>mjoseph20</dc:creator>
      <dc:date>2023-08-03T15:35:44Z</dc:date>
    </item>
  </channel>
</rss>

