<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Zbot infection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760387#M529711</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh xlate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Sep 2011 16:01:35 GMT</pubDate>
    <dc:creator>smsneteng</dc:creator>
    <dc:date>2011-09-30T16:01:35Z</dc:date>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760383#M529707</link>
      <description>&lt;P&gt;Is there any way to use an asa 5510 to detect which computer on the inside of my network is connecting to ip 87.255.51.229.&amp;nbsp; I am being blacklisted for w win32/Zbot connection, I need to identify this computer and get it disconnected from the network ASAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760383#M529707</guid>
      <dc:creator>crash5050</dc:creator>
      <dc:date>2019-03-11T21:31:31Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760384#M529708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The we handle it is to setup a rule blocking any to 87.255.51.229 ip. Make sure logging is setup on that rule then monitor for which IPs attempt to connect to that external ip address. Once you have the IPs then do a DNS lookup to get the hostname. This works if you have time to monitor the log all day. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is better to have a SIEM tool to do this but it is possible with the ASA. Also you can enable syslog (and\or netflow) on the ASA and have the ASA send it's logs to a server and then you can go back in time and look for connection attempts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 17:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760384#M529708</guid>
      <dc:creator>jason.giambrone</dc:creator>
      <dc:date>2011-09-28T17:40:20Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760385#M529709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding to the great answer of Jason Giambrone you could perform a show conn | include 87.255.51.229.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have worked in an issue like that and this was the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 19:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760385#M529709</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-28T19:34:16Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760386#M529710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable NetFlow on the ASA, install some free NetFlow monitoring tool, analyze the destinaltion IP Address and find the related source IP's involved. You can then clean up those machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable NetFlow on the ASA, check the below blog. You will need IOS 8.2 and above.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blogs.manageengine.com/netflowanalyzer/2010/07/22/configuring-cisco-asa-netflow-via-asdm"&gt;http://blogs.manageengine.com/netflowanalyzer/2010/07/22/configuring-cisco-asa-netflow-via-asdm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Don Thomas Jacob&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.manageengine.com/products/netflow/"&gt;ManageEngine NetFlow Analyzer&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 13:39:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760386#M529710</guid>
      <dc:creator>Don Jacob</dc:creator>
      <dc:date>2011-09-30T13:39:40Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760387#M529711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh xlate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 16:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760387#M529711</guid>
      <dc:creator>smsneteng</dc:creator>
      <dc:date>2011-09-30T16:01:35Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760388#M529712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Additionally, I forgot to mention, you could not only trace the connection, but deny the inbound at the same time---you would set up an access-list outbound on the inside interface allowing TCP-SYN to that IP address (or even block)---this is NOT to be confused with CBAC or allowing any any esytablished, as that allows the SYN-ACK back in---you want to allow SYN out, but deny the SYN-ACK back in, and log outbound connections all day long, WITHOUT worrying about anything coming back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the host is filtering 997 ports, has one closed, and is using 53 (DNS) and 80 (duh). It could be any of these OS's...: &lt;/P&gt;&lt;P&gt;AVM FRITZ!Box FON WLAN 7050, Linksys WAG200G, or Netgear DG834GT wireless broadband router (94%), Western Digital MyBook World Edition 2 NAS device (Linux 2.6.17.14) (90%), ISS Proventia GX3002C firewall (Linux 2.4.18) (87%), Linux 2.6.9 (86%), ISS Proventia GX3002 firewall (Linux 2.4.18) (85%), Linux 2.6.26 (85%), Linux 2.6.18 (85%), AVM FRITZ!Box FON WLAN 7170 WAP (85%), Linux 2.6.11 (85%), D-Link DNS-323 NAS device or Linksys WRT300N wireless broadband router (85%)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is interesting...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;| robots.txt: has 1 disallowed entry &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;|_/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it has been up for 2 hours so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 16:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760388#M529712</guid>
      <dc:creator>smsneteng</dc:creator>
      <dc:date>2011-09-30T16:18:31Z</dc:date>
    </item>
    <item>
      <title>Zbot infection</title>
      <link>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760389#M529713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why do I keep hitting "Reply"? It's as temptiong as my email "Reply All"...lol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So anyway, your outside address could be the one in the robots.txt. You're not the only one getting black-holed/rerouted through evo-fiberring.com...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have a read&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://forums.darkfallonline.com/showthread.php?t=285685"&gt;http://forums.darkfallonline.com/showthread.php?t=285685&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and good luck!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Tim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 16:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbot-infection/m-p/1760389#M529713</guid>
      <dc:creator>smsneteng</dc:creator>
      <dc:date>2011-09-30T16:27:02Z</dc:date>
    </item>
  </channel>
</rss>

