<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Worm Activity - IDS Going Crazy - Can you help with the analysis in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234830#M53708</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sylvester - Thanks for response.&amp;nbsp; Couple of things here :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes is the AIP-SSM module residing in ASA 5585&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would think that I normally would want to include internal subnets in scope of the acl.&amp;nbsp; Is this not how the implementation would typically go?&amp;nbsp; This is a new implementation and is only about 3 weeks old.&amp;nbsp; However, when I inititially brought it online - I don't recall seeing these kinds of hits for this type of activity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing is that I am receiving around 3 hits per second (same thing always port 80 and/or 443 and always 0.0.0.0 as the victim)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally - I am up to around 1400 different internal hosts so I'm kinda in a "can't see the forest because of the trees" conundrum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am receiving only an occasional abuse notification on the issue and when we track down individual hosts - we are seeing no worm activity on that host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Almost want to believe that I am getting "false positives" here - but having trouble deciding how to proceed other than what I have been doing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any further advice would be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Jun 2013 14:15:31 GMT</pubDate>
    <dc:creator>Lonnie Nagel</dc:creator>
    <dc:date>2013-06-18T14:15:31Z</dc:date>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234827#M53705</link>
      <description>&lt;P&gt;This is what I am seeing on the IDS (lots of these with lots of attackers - but always 0.0.0.0 for victime)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;evIdsAlert: eventId=6824202298114&amp;nbsp; vendor=Cisco&amp;nbsp; severity=high&amp;nbsp; alarmTraits=32768&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; originator:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hostId: TAMUK_IPS-9&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appName: sensorApp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; appInstanceId: 3448&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; time: Jun 17, 2013 20:57:09 UTC&amp;nbsp; offset=-300&amp;nbsp; timeZone=CDT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; signature:&amp;nbsp;&amp;nbsp; description=AD - External TCP Scanner&amp;nbsp; id=13003&amp;nbsp; version=S262&amp;nbsp; type=anomaly&amp;nbsp; created=20061120&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; subsigId: 1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sigDetails: Worm Attack&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; interfaceGroup: vs0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan: 0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; participants:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; attacker:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 139.XX.XXX.240&amp;nbsp; locality=OUT&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; target:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; addr: 0.0.0.0&amp;nbsp; locality=Unknown&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port: 80&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; actions:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipLoggingActivated: true&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; shunRequested: true&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; denyPacketRequestedNotPerformed: true&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; logAttackerPacketsActivated: true&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; logVictimPacketsActivated: true&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; alertDetails: .&amp;nbsp;&amp;nbsp;&amp;nbsp; adExtraData: numDestIps=5; currentThreshold=5; destPort=80 ;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; ipLogIds:&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipLogId: 2&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; riskRatingValue: 100&amp;nbsp; targetValueRating=medium&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; threatRatingValue: 80&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; interface: po0_0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol: tcp&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Idea of what I am looking at here - All reports list the port as either 443 or 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234827#M53705</guid>
      <dc:creator>Lonnie Nagel</dc:creator>
      <dc:date>2019-03-10T12:58:51Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234828#M53706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Also note that all of my "attackers" are listed as internal IP addressess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All Victims are listed as 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All ports are listed as either 80 or 443&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 13:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234828#M53706</guid>
      <dc:creator>Lonnie Nagel</dc:creator>
      <dc:date>2013-06-18T13:23:19Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234829#M53707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Lonnie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Is this an AIP-SSM module? if so your IPS is configured with a global policy to match any traffic (which includes internal network)or your internal subnet is included in the ACL (Access-list IPS_acl permit 192.X.X.X ; match IPS_acl ) to be inspected. This is likely the reason why you can see internal IP addresses as the attacker.... having said that, i would track down the attacking computer and investigate it further or take it offline and see if alert stops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sylvester&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 13:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234829#M53707</guid>
      <dc:creator>smetieh001</dc:creator>
      <dc:date>2013-06-18T13:38:43Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234830#M53708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sylvester - Thanks for response.&amp;nbsp; Couple of things here :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes is the AIP-SSM module residing in ASA 5585&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would think that I normally would want to include internal subnets in scope of the acl.&amp;nbsp; Is this not how the implementation would typically go?&amp;nbsp; This is a new implementation and is only about 3 weeks old.&amp;nbsp; However, when I inititially brought it online - I don't recall seeing these kinds of hits for this type of activity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing is that I am receiving around 3 hits per second (same thing always port 80 and/or 443 and always 0.0.0.0 as the victim)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally - I am up to around 1400 different internal hosts so I'm kinda in a "can't see the forest because of the trees" conundrum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am receiving only an occasional abuse notification on the issue and when we track down individual hosts - we are seeing no worm activity on that host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Almost want to believe that I am getting "false positives" here - but having trouble deciding how to proceed other than what I have been doing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any further advice would be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 14:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234830#M53708</guid>
      <dc:creator>Lonnie Nagel</dc:creator>
      <dc:date>2013-06-18T14:15:31Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234831#M53709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First Internal network should normally be in the ACL - better security practise. Is your IPS set to anormally detection? (I see that the signature giving off this alert is an AD signature), if so your IPS might may have sensed some traffic it considers abnormal and then resulted in false positives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instance wen this could happen is if network traffic partern changes due to changes in network activity i.e. due to a new enterprise application deployment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your IPS was deployed 3 weeks ago chances are that it has not fully learned the environment before being put into active service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would investigate a couple of these computers (attackers) to rule out warm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are just my thought....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/ips/7.2/configuration/guide/ime/ime_anomaly_detections.pdf"&gt;http://www.cisco.com/en/US/docs/security/ips/7.2/configuration/guide/ime/ime_anomaly_detections.pdf&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sylvester&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 15:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234831#M53709</guid>
      <dc:creator>smetieh001</dc:creator>
      <dc:date>2013-06-18T15:03:05Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234832#M53710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is your IPS issue resolved? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 19:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234832#M53710</guid>
      <dc:creator>smetieh001</dc:creator>
      <dc:date>2013-06-18T19:21:34Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234833#M53711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not quite but a bit closer.&amp;nbsp; We were able to determine a "phone home" address (amsterdam) and have set up an ACL Block in firewall.&amp;nbsp; It appears that 40 or so machines are reporting back to the IP so we are currently sending desktop guys out to verify that the worm actually resides on those machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question you might know the answer to - We seem to have the ACL working correctly as we received 800,000 hits in the first hour or so.&amp;nbsp; However - I am still seeing activity in the IDS event viewer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IDS/IPS is the AIP-SSM so with the ACL block in the ASA should'nt the event viewer in the IPS have stopped logging.&amp;nbsp; I guess the question is - In order of sequence does the ASA protection come 1st or does the IPS protection come first for outbound traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 20:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234833#M53711</guid>
      <dc:creator>Lonnie Nagel</dc:creator>
      <dc:date>2013-06-18T20:44:38Z</dc:date>
    </item>
    <item>
      <title>Worm Activity - IDS Going Crazy - Can you help with the analysis</title>
      <link>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234834#M53712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lonnie, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am happy to hear you are making good progress. I think investigating those 40 machine was the write call.&lt;/P&gt;&lt;P&gt;What i can see from your log is that the IDS/IPS signature requested a "Shun" which the ASA responds to, and blocks the traffic for a duration. if i am not mistaking, It means the IDS/IPS received the traffic before the block was placed by the IPS. I guess that's why you still recieve the alerts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/quick_start/ips/ips_qsg.html"&gt;http://www.cisco.com/en/US/docs/security/asa/quick_start/ips/ips_qsg.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sylvester&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 14:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/worm-activity-ids-going-crazy-can-you-help-with-the-analysis/m-p/2234834#M53712</guid>
      <dc:creator>smetieh001</dc:creator>
      <dc:date>2013-06-19T14:34:35Z</dc:date>
    </item>
  </channel>
</rss>

