<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Odd that everyone is saying in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577984#M45339</link>
    <description>&lt;P&gt;Odd that everyone is saying that these are false positives.&amp;nbsp; Our IPS alerted about a number of hosts, an AV scan found crytpowall on all of the hosts that IPS has reported.&amp;nbsp; Furthur analysis discovered that the&amp;nbsp; malware was being served from the ads on trusted sites.&amp;nbsp; The advertisements exploited vulnerability in flash player and injected itself into iexplorer process without any interaction from the user. Our AV did not detect the initial injection as it does not have heuristics. I have not received any alerts since the signature was updated, I hope that it is still doing its job.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Nov 2014 16:56:18 GMT</pubDate>
    <dc:creator>ebell</dc:creator>
    <dc:date>2014-11-14T16:56:18Z</dc:date>
    <item>
      <title>Cryptowall</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577972#M45319</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am receiving alerts related to Cryptowall signature which was newly release. The detection are from Internal source.&lt;/P&gt;&lt;P&gt;I am wondering if this is also the same with BASH vulnerability signature which was revised due to false positives detection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577972#M45319</guid>
      <dc:creator>Jhun Banzuela</dc:creator>
      <dc:date>2019-03-10T13:16:53Z</dc:date>
    </item>
    <item>
      <title>I'm seeing 100's of IP's</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577973#M45320</link>
      <description>&lt;P&gt;I'm seeing 100's of IP's being flagged by signature 4777/3, but so far all the systems that have been checked have been found not to have cryptowall. I believe we are seeing false positives.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 13:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577973#M45320</guid>
      <dc:creator>bdsmith</dc:creator>
      <dc:date>2014-11-10T13:23:25Z</dc:date>
    </item>
    <item>
      <title>I've also seen a few of these</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577974#M45321</link>
      <description>&lt;P&gt;I've also seen a few of these alerts coming in since the new&amp;nbsp;S834 release and found no cryptowall on the triggering systems either&amp;nbsp;so these do seem to be false positives. &amp;nbsp;Is it advisable that&amp;nbsp;we disable this signature for the time being or is there a safer way to fine tune it to avoid these false positives?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 16:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577974#M45321</guid>
      <dc:creator>mitchen</dc:creator>
      <dc:date>2014-11-10T16:21:50Z</dc:date>
    </item>
    <item>
      <title>We're seeing the same thing.</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577975#M45322</link>
      <description>&lt;P&gt;We're seeing the same thing. The traffic that is triggering the alerts are web requests sent to various&amp;nbsp;advertisement sites. &lt;SPAN style="font-size: 16.3636360168457px;"&gt;The uri's seem to match the pattern in the signature, although t&lt;/SPAN&gt;hey look non-malicious.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 20:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577975#M45322</guid>
      <dc:creator>ADAM PYNE</dc:creator>
      <dc:date>2014-11-10T20:01:39Z</dc:date>
    </item>
    <item>
      <title>We are seeing this today too.</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577976#M45323</link>
      <description>&lt;P&gt;We are seeing this today too. &amp;nbsp;A few do seem to go to ad sites...others do not. &amp;nbsp;Computers scanned with the latest Malwarebytes and Symantec show up clean. &amp;nbsp; .&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2014 06:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577976#M45323</guid>
      <dc:creator>Terry S</dc:creator>
      <dc:date>2014-11-11T06:54:55Z</dc:date>
    </item>
    <item>
      <title>Hi,Our IPS shows this alert</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577977#M45325</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Our IPS shows this alert too.&lt;BR /&gt;Victim from LAN sends HTTP GET request to different advertisement sites.&lt;BR /&gt;This looks like FP but I found some recent threads/posts/blogs about "Malvertising" campaign created to "infect unsuspecting visitors with CryptoWall 2.0 ransomware on sites such as Yahoo, The Atlantic and AOL":&lt;BR /&gt;1. &lt;A href="http://www.proofpoint.com/threatinsight/posts/malware-in-ad-networks-infects-visitors-and-jeopardizes-brands.php" target="_blank"&gt;http://www.proofpoint.com/threatinsight/posts/malware-in-ad-networks-infects-visitors-and-jeopardizes-brands.php&lt;/A&gt;&lt;BR /&gt;2. &lt;A href="http://forums.cnet.com/7723-6132_102-629128/malvertising-campaign-on-yahoo-aol-triggers-cryptowall/" target="_blank"&gt;http://forums.cnet.com/7723-6132_102-629128/malvertising-campaign-on-yahoo-aol-triggers-cryptowall/&lt;/A&gt;&lt;BR /&gt;3. &lt;A href="http://threatpost.com/malvertising-campaign-on-yahoo-aol-triggers-cryptowall-infections/108987" target="_blank"&gt;http://threatpost.com/malvertising-campaign-on-yahoo-aol-triggers-cryptowall-infections/108987&lt;/A&gt;&lt;BR /&gt;Etc.&lt;BR /&gt;Therefore, behavior of victim seems suspicious.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2014 07:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577977#M45325</guid>
      <dc:creator>Vld Fuib</dc:creator>
      <dc:date>2014-11-11T07:59:15Z</dc:date>
    </item>
    <item>
      <title>Ours began tripping and</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577978#M45326</link>
      <description>&lt;P&gt;Ours began tripping and showing the 4777/3 as well at around 10:50 EST on 11/10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2014 15:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577978#M45326</guid>
      <dc:creator>bradlesw1</dc:creator>
      <dc:date>2014-11-11T15:33:20Z</dc:date>
    </item>
    <item>
      <title>Same here, hundreds of web</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577979#M45327</link>
      <description>&lt;P&gt;Same here, hundreds of web request getting flagged as if we're attacking these sites, but all the packets are my clients requesting from them. There are alphanumeric strings that seem to match the signature of an attack, but to me they seem to be more of cookie junk. Other times, it's a simple html request with nothing that seems like it could match. I get a range of it being well-known websites like National Geographic or Yahoo, to several ad sites. Pretty certain all are false positives.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2014 17:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577979#M45327</guid>
      <dc:creator>Edward Urban</dc:creator>
      <dc:date>2014-11-11T17:24:00Z</dc:date>
    </item>
    <item>
      <title>The same thing is happening</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577980#M45329</link>
      <description>&lt;P&gt;The same thing is happening on our IPS, it is detecting traffic coming from our IronPort Web Filter which is apparently attacking&amp;nbsp;Random Sites since the 10th of November.&lt;/P&gt;&lt;P&gt;Any news from&amp;nbsp;Cisco in regards to this being a false positive, as there are a few people in our organisation getting excited about this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 05:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577980#M45329</guid>
      <dc:creator>christopher.diakiw</dc:creator>
      <dc:date>2014-11-12T05:48:54Z</dc:date>
    </item>
    <item>
      <title>Update your signatures, the</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577981#M45331</link>
      <description>&lt;P&gt;Update your signatures, the new signature is written to take into account the actual known C&amp;amp;C sites. It was updated last night it seems and I am no longer getting a flood.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Nov 2014 22:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577981#M45331</guid>
      <dc:creator>Edward Urban</dc:creator>
      <dc:date>2014-11-12T22:11:20Z</dc:date>
    </item>
    <item>
      <title>Ours stopped as well.  I</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577982#M45333</link>
      <description>&lt;P&gt;Ours stopped as well. &amp;nbsp;I guess 834 started it and 835 stopped it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 14:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577982#M45333</guid>
      <dc:creator>bradlesw1</dc:creator>
      <dc:date>2014-11-13T14:10:11Z</dc:date>
    </item>
    <item>
      <title>Thanks Guys Ours has stopped</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577983#M45336</link>
      <description>&lt;P&gt;Thanks Guys&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ours has stopped now after the signatures were updated.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 23:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577983#M45336</guid>
      <dc:creator>christopher.diakiw</dc:creator>
      <dc:date>2014-11-13T23:17:20Z</dc:date>
    </item>
    <item>
      <title>Odd that everyone is saying</title>
      <link>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577984#M45339</link>
      <description>&lt;P&gt;Odd that everyone is saying that these are false positives.&amp;nbsp; Our IPS alerted about a number of hosts, an AV scan found crytpowall on all of the hosts that IPS has reported.&amp;nbsp; Furthur analysis discovered that the&amp;nbsp; malware was being served from the ads on trusted sites.&amp;nbsp; The advertisements exploited vulnerability in flash player and injected itself into iexplorer process without any interaction from the user. Our AV did not detect the initial injection as it does not have heuristics. I have not received any alerts since the signature was updated, I hope that it is still doing its job.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 16:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cryptowall/m-p/2577984#M45339</guid>
      <dc:creator>ebell</dc:creator>
      <dc:date>2014-11-14T16:56:18Z</dc:date>
    </item>
  </channel>
</rss>

