<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stealthwatch SLIC Issue-Question in Security Analytics</title>
    <link>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4171607#M589</link>
    <description>&lt;P&gt;We have experienced similar cases several times, mostly associated with Azorult and Smokeloader.&lt;BR /&gt;As was stated above, I also think this will probably happen bcause Google or other service providers have malware hosted on one server and this IP gets flagged as C&amp;amp;C server which triggers the events for normal google traffic.&lt;BR /&gt;&lt;BR /&gt;As far as I know, Cisco is working on a migration for the security intelligence feed to TALOS, so I guess we can expect a change for this behaviour in the future.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 09:03:26 GMT</pubDate>
    <dc:creator>FloKo</dc:creator>
    <dc:date>2020-10-22T09:03:26Z</dc:date>
    <item>
      <title>Stealthwatch SLIC Issue-Question</title>
      <link>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4027556#M430</link>
      <description>&lt;P&gt;Things appeared to go sideways yesterday (02/10) with regard to the data in the SLIC feed - as we received 40+ alerts of C&amp;amp;C activity as users were browsing to &lt;A href="http://www.google.com" target="_blank" rel="noopener"&gt;www.google.com&lt;/A&gt; - the destination IPs were what is expected for Google&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The destination C&amp;amp;C server group in question was Azorult&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today it seems to have returned to normal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couple of questions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm looking for a way to query the IP addresses in a given SLIC feel host group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious if anybody else saw similar behavior&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Bob&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 14:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4027556#M430</guid>
      <dc:creator>reheindel</dc:creator>
      <dc:date>2020-02-11T14:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Stealthwatch SLIC Issue-Question</title>
      <link>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4028730#M433</link>
      <description>&lt;P&gt;We have no option to look IP in the SLIC database. This data is OEMed and they don't give permission to do it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recently there are many cloud-based hosted services like Google Cloud, AWS and so on. If one of the public hosted IP is infected malware and become a one of botnet, SLIC will add the IP in the list. In another case, our vendor's honey pod finds attacks that has a crafted source IP same as Google-owned and adds it to the list.&lt;/P&gt;
&lt;P&gt;If you find this kind of issue, please contact TAC and they can escalate it to OEM vendor to resolve it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case, probably the vendor gets a support request from someone who owns/runs the IP and fix it. Security Intelligence is based on mutual cooperation, so customer feedback is important to the accurate database maintain.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 05:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4028730#M433</guid>
      <dc:creator>kyoshiik</dc:creator>
      <dc:date>2020-02-13T05:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: Stealthwatch SLIC Issue-Question</title>
      <link>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4171607#M589</link>
      <description>&lt;P&gt;We have experienced similar cases several times, mostly associated with Azorult and Smokeloader.&lt;BR /&gt;As was stated above, I also think this will probably happen bcause Google or other service providers have malware hosted on one server and this IP gets flagged as C&amp;amp;C server which triggers the events for normal google traffic.&lt;BR /&gt;&lt;BR /&gt;As far as I know, Cisco is working on a migration for the security intelligence feed to TALOS, so I guess we can expect a change for this behaviour in the future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 09:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/security-analytics/stealthwatch-slic-issue-question/m-p/4171607#M589</guid>
      <dc:creator>FloKo</dc:creator>
      <dc:date>2020-10-22T09:03:26Z</dc:date>
    </item>
  </channel>
</rss>

