06-28-2010 03:50 PM - edited 03-10-2019 05:02 AM
We are using the Cisco IPS 4215 and seeing this alert over and over.
Sig Name: Worm Activity - Brute Force
Sig ID: 16297
Severity: High
Risk Rating: 95
Sig Version: S392
Is this a false postive or something else?
06-29-2010 03:45 AM
It is not possible to determine from the information you provided.
You can learn more about a specific signature (and potential benign triggers) by visiting the Cisco IntelliShield site:
For signature 16297/1, the following details are available:
Signature 16297/1 is based on signature 16297/0:
It would be best to look at the services running on the reported attacker, and determine if there is a legitimate reason for it to attempt a SMB logon to the victim system and cause 9 logon failures in a 30 second period. Perhaps an automated service is still attempting to log into the victim system with outdated credentials.
Scott
07-02-2010 09:47 AM
Thanks for the great information, looks like subsig 0 is
not a big deal...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide