<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/3197919#M43804</link>
    <description>&lt;P&gt;If the packet is dropped, how can I confirm that another sercurity tool or AV is responsible for the reverse DNS lookup?&lt;/P&gt;</description>
    <pubDate>Thu, 12 Oct 2017 18:19:47 GMT</pubDate>
    <dc:creator>pahsative</dc:creator>
    <dc:date>2017-10-12T18:19:47Z</dc:date>
    <item>
      <title>What does "BLACKLIST DNS reverse lookup response for known malware domain spheral.ru - Win.Trojan.Glupteba (1:31600)" mean?</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892545#M43794</link>
      <description>&lt;P&gt;I have a Cisco ASA5516x w/ FirePOWER with an IPS license installed and I am trying to determine what this Impact 1 alert means:&lt;/P&gt;
&lt;P&gt;BLACKLIST DNS reverse lookup response for known malware domain spheral.ru - Win.Trojan.Glupteba (1:31600)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The source looks like it is coming from DNS servers on the internet:&lt;/P&gt;
&lt;P&gt;208.67.220.220&lt;/P&gt;
&lt;P&gt;208.67.222.222&lt;/P&gt;
&lt;P&gt;4.2.2.6&lt;/P&gt;
&lt;P&gt;204.117.214.10&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The destination is our domain controllers that are configured to be our DNS servers. I'm just trying to figure out what this alert really means? The classification is "A Network Trojan was Detected", but does that mean that a user tried to resolve a DNS record to a site that has been flagged as malicious, or that they have malware on their PC that is trying to connect a Command &amp;amp; Control server out in the wild? To be clear the ingress for these alerts are out Outside interface and the egress is our Inside interface. If anyone can provide a clear explanation for these alerts it would be greatly appreciated. Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892545#M43794</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2019-03-10T13:38:39Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892546#M43796</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It does not necessarily mean that the PC or DC are infected. This rule is for reverse DNS lookup.&lt;/P&gt;
&lt;P&gt;With the source and destination, it could just be a packet which is the reply of reverse DNS lookup request . Now why would that request be sent in first place is an question and worth investigation.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;flow:to_client; content:"|07|spheral|02|ru|00|"; fast_pattern:only; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;You can check download packet capture in the rule event and check the IP address for which is resolved for&amp;nbsp; &lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;spheral.ru&amp;nbsp; and then identify which PC initiated the request.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;Sometimes it could be an AV or security product trying to do reverse DNS lookup for a suspicious IP.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;Rate if helps.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="color: #333333; font-family: verdana,sans-serif; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; display: inline ! important; float: none; background-color: #ffffff;"&gt;Yogesh&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #333333; font-family: verdana, sans-serif; font-size: 10.6667px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 16px; orphans: auto; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; background-color: #ffffff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 00:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892546#M43796</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2016-07-06T00:19:35Z</dc:date>
    </item>
    <item>
      <title>Thanks, Yogesh!</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892547#M43799</link>
      <description>&lt;P&gt;Thanks, Yogesh!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 14:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892547#M43799</guid>
      <dc:creator>rweir0001</dc:creator>
      <dc:date>2016-07-06T14:17:00Z</dc:date>
    </item>
    <item>
      <title>We've been getting similar</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892548#M43802</link>
      <description>&lt;P&gt;I had posted briefly that we began seeing additional, internal logs regarding these reverse DNS queries, but Solarwinds support said they were just internal DNS queries that resulted from the syslogs sent from FireSight. I still suggest careful vigilance, as always.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 15:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/2892548#M43802</guid>
      <dc:creator>JBL0w3ryLLC</dc:creator>
      <dc:date>2016-08-26T15:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Hi</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/3197919#M43804</link>
      <description>&lt;P&gt;If the packet is dropped, how can I confirm that another sercurity tool or AV is responsible for the reverse DNS lookup?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Oct 2017 18:19:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/3197919#M43804</guid>
      <dc:creator>pahsative</dc:creator>
      <dc:date>2017-10-12T18:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hi</title>
      <link>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/3712131#M43805</link>
      <description>&lt;P&gt;How do you&amp;nbsp;&lt;SPAN&gt;identify which PC initiated the DNS request?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Sep 2018 14:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-does-quot-blacklist-dns-reverse-lookup-response-for-known/m-p/3712131#M43805</guid>
      <dc:creator>tjohnson@reliant-cap.com</dc:creator>
      <dc:date>2018-09-24T14:14:46Z</dc:date>
    </item>
  </channel>
</rss>

