cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4482
Views
25
Helpful
19
Replies

False positive? GT:JS.Hyena.3 detections

Chris05
Level 1
Level 1

Last night we started getting GT:JS.Hyena.3.x detections on a number of computers. We are continuing to receive them, over 150 machines so far. Anyone else seeing this? 

1 Accepted Solution

Accepted Solutions

The signature number was 14081197 and it was updated on the 10th around 2300 UTC. Hope that helps.

-Matt

View solution in original post

19 Replies 19

Matthew Franks
Cisco Employee
Cisco Employee

TALOS is investigating for a potential FP.

MidwestCyber
Level 1
Level 1

Seeing this on a large number of hosts in our environment. Appears to relate to browser updates.

ventaran
Level 1
Level 1

had a few boxes pop. no wscript or cscript action either. odd. this looks like a FP

 

mpdonovan
Level 1
Level 1

Still seeing this on a growing number of endpoints.

Chris05
Level 1
Level 1

We also continue to get these - a few hundred more detections throughout the night. 

Matthew Franks
Cisco Employee
Cisco Employee

I've requested an update from TALOS and also stressed the priority. If you haven't, please open a TAC case as this will help with the prioritization.

Thank you Matthew. Yes, we also opened a TAC case yesterday.  Last update was from yesterday afternoon. 

Hello, Talos is still investigating the issue at hand.

Far as the alerts, you can do the following options: 

  1. Add a "Threat" type exclusion for the specific signature which is being triggered until the false positive analysis is completed and fixed.
  2. Add the file path to exclusions.
  3. Disable Tetra

The options above are only temporary remediations until the false positive issue is fixed and, of course, this is solely your discretion, but I wanted to offer this to you as you mentioned you are receiving numerous alerts in the console.

Every time I get one of these, I make sure that the file gets uploaded to Secure Malware Analytics (ThreatGrid) for analysis, and open a file reputation case at TalosIntelligence.com.



________________________________

This email is intended solely for the use of the individual to whom it is addressed and may contain information that is privileged, confidential or otherwise exempt from disclosure under applicable law. If the reader of this email is not the intended recipient or the employee or agent responsible for delivering the message to the intended recipient, you are hereby notified that any dissemination, distribution, or copying of this communication is strictly prohibited.
If you have received this communication in error, please immediately notify us by telephone and return the original message to us at the listed email address.
Thank You.

L8Tarkov
Level 1
Level 1

I also had a large number of these pop up and opened a file reputation case at Talos but they closed it right away. Has it been confirmed a false positive?

As of now, it still hasn't been confirmed as a false positive.  I will post again when we hear back from TAC.

ARB65
Level 1
Level 1

Opened a TAC case last night.  Got detections of this on 5 computers so far since 7:45PM ET last night.

MidwestCyber
Level 1
Level 1

TAC case opened here as well. I have been told Talos is aware of the situation.

We have over 250 detections at this point.

ARB65
Level 1
Level 1

Just got Secure Endpoint notification

Cisco is aware of the false positive detections related to JS.Hyena.3.xxxx that started at approximately 2024-04-09 18:26 UTC. The signatures involved are being reviewed and Cisco is investigating the root cause. We apologize for any inconvenience this may have caused.

 

Fred_A
Level 1
Level 1

Keep securing and being watchful until a response back from Cisco.