12-06-2018 12:18 AM - edited 03-12-2019 07:09 AM
Hi all,
We use sourcefire in our company. Current version 6.2.2.
In the last 10 days, approximately 1000 MALWARE-BACKDOOR JSP webshell backdoor were detected.The source and destination IP information are constantly changing. Have you been living this situation lately? Is there any information on the subject in the Global?
12-06-2018 12:24 AM
12-09-2018 11:46 PM
Yeah, its quite same here.. any idea how/what is the behaviour of the this variant? Doesnt find much information!
12-11-2018 01:56 PM
Recently I had a bunch of these show up in my logs too. The thing that is confusing to me is that the security appliance makes it appear that all the traffic came from outside my network and was blocked. Basically someone was probing my network to see if anything was listening on this end. That's what I'm used to seeing and it's expected of course.
Then I got concerned when I look at the Snort description for this item: This activity is indicative of malware activity on a host. In this case the MALWARE-BACKDOOR JSP webshell backdoor detected was detected.
That makes it look like this is evidence of an active bit of malware on my server. I'm guessing that the JSP in the malware name is "Java Server Pages" and I don't have Java installed on that server. The server comes up clean in malware scans too.
Is there a way to have any level of assurance that this was just probing from the outside and not evidence of something inside like the Snort description seems to indicate?
12-19-2018 10:22 PM
.What the cisco employees think about the problem. If a botnet traffic, the global soc unit can be informed
12-27-2018 06:32 AM - edited 12-27-2018 06:43 AM
I've had a very hard time getting any traction on this in the month I've been working with TAC on the hundreds of impact red, priority 1 alerts we've been getting because of this. I've only gotten to the point where they've confirmed with Talos that these incidents I'm logging in FMC and in IIS are generated from vulnerability scanners/URL fuzzers. I've installed the custom remediation blacklist plugin to automate blocking the external, non-us sources that trigger IPS blocks, but I haven't been able to get any feedback on IPS/snort rule precedence etc to ensure CORRECT classification for more specific strings in new rules. In our case, we're seeing the following:
".jsp?ppp=echo%20D3c3mb3r"
"/jbossass/jbossass.jsp?ppp=echo%20D3c3mb3r"
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide