Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Zoom Alert! (Network Trojan Detected)

    Scheduled Pinned Locked Moved Firewalling
    16 Posts 6 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by johnpoz

      And are you on a mac? Do you have those ports forwarded to your PC that this webserver listened on? Why would you have any ports open?

      Also zoom removed that webserver they installed back in july of 2019. Is your zoom software that far out of date?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      D 1 Reply Last reply Reply Quote 0
      • I
        Impatient @denis_ju
        last edited by

        @rimaju Perhap's you should read also this article also-
        https://doc.emergingthreats.net/bin/view/Main/2009205

        Notice the Date

        1 Reply Last reply Reply Quote 1
        • D
          denis_ju @johnpoz
          last edited by

          @johnpoz

          I'm on ubuntu 20.04 LTS.
          I have no port forwards.
          Zoom was on ubuntu 20.04 LTS installed.

          On my sort WAN interface i have included/activated about "11 Conficker" rules.

          1 2009200 tcp $EXTERNAL_NET any $HOME_NET 445 ET TROJAN Conficker.a Shellcode
          1 2009201 tcp $EXTERNAL_NET any $HOME_NET 445 ET TROJAN Conficker.b Shellcode
          1 2009206 udp $HOME_NET [!1720,!1722,!2427,!5060,1024:] $EXTERNAL_NET [!1720,!1722,!2427,!5060,1024:] ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 4)
          1 2009207 udp $HOME_NET [!1720,!1722,!2427,!5060,1024:] $EXTERNAL_NET [!1720,!1722,!2427,!5060,1024:] ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 5)
          1 2009208 udp $HOME_NET [!1720,!1722,!2427,!5060,1024:] $EXTERNAL_NET [!1720,!1722,!2427,!5060,1024:] ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 16)
          1 2008739 tcp $HOME_NET any $EXTERNAL_NET $HTTP_PORTS ET TROJAN Conficker/MS08-067 Worm Traffic Outbound
          1 2009205 udp $HOME_NET [!1720,!1722,!2222,!2427,!5060,1024:] $EXTERNAL_NET [!1720,!1722,!2427,!5060,1024:] ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 1)
          1 2009024 tcp $HOME_NET any $EXTERNAL_NET $HTTP_PORTS ET TROJAN Downadup/Conficker A or B Worm reporting
          1 2008737 tcp $HOME_NET any $EXTERNAL_NET $HTTP_PORTS ET TROJAN Conficker/KernelBot/MS08-067 related Trojan Checkin
          1 2009114 tcp $HOME_NET any $EXTERNAL_NET $HTTP_PORTS ET TROJAN Downadup/Conficker A Worm reporting
          1 2008738 tcp $HOME_NET any $EXTERNAL_NET $HTTP_PORTS ET TROJAN Suspicious Accept-Language HTTP Header zh-cn likely Kernelbot/Conficker Trojan Related

          With those rules applied, i found a lot of alerts. Not only from Zoom ip's.

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by johnpoz

            You honestly think that Conflicker infected your ubuntu machine?

            You really should not run an IPS unless you understand that its going to be a TON of noise and false positives.. And you disable the ones that create false positives for your normal traffic flow..

            Well you should investigate the traffic if your concerned.. That's why you run a IPS right..

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • M
              mtiede @denis_ju
              last edited by

              @denis_ju

              No one seemed to answer your question, so I will, even if it is LATE.

              Yes, I have seen this. Here is what I get when using my Synology RT6600ax with "Threat Prevention".

              ET MALWARE Possible KEYPLUG/Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 1)

              I also get (bit value 4) and (bit value 5) events.

              This is traffic going from my wife's phone when doing SilverSneakers with zoom. The target IP is 147.124.99.62
              which is Zoom Video Communications, Inc (ZVC). Destination port is 8801.

              So, the same thing you are seeing, but a slightly different IP for Zoom.

              It isn't clear to me if the phone actually has something, or, more likely, the "Threat Prevention" is just seeing encrypted P2P using UDP and is assuming it is a trojan.

              M 1 Reply Last reply Reply Quote 0
              • M
                michmoor LAYER 8 Rebel Alliance @mtiede
                last edited by

                @mtiede the phone has something? It’s an obvious false alert.

                Firewall: NetGate,Palo Alto-VM,Juniper SRX
                Routing: Juniper, Arista, Cisco
                Switching: Juniper, Arista, Cisco
                Wireless: Unifi, Aruba IAP
                JNCIP,CCNP Enterprise

                M 1 Reply Last reply Reply Quote 0
                • M
                  mtiede @michmoor
                  last edited by

                  @michmoor

                  It's obvious until it isn't. I was just trying to do for him what I was hoping for. That someone else could CONFIRM the same thing was happening with a different environment. That makes it more obvious for me.

                  M johnpozJ 2 Replies Last reply Reply Quote 0
                  • M
                    michmoor LAYER 8 Rebel Alliance @mtiede
                    last edited by

                    @mtiede I understand but without looking at the payload of a packet you can deduce based on IP reputation and ownership as well as Zoom documentation which tells you what ports are needed to work. Without a SIEM stack this is the best that can be done I would think.

                    Firewall: NetGate,Palo Alto-VM,Juniper SRX
                    Routing: Juniper, Arista, Cisco
                    Switching: Juniper, Arista, Cisco
                    Wireless: Unifi, Aruba IAP
                    JNCIP,CCNP Enterprise

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @mtiede
                      last edited by johnpoz

                      @mtiede you understand this thread is over 2 year old??

                      Blatantly obvious 2 years ago this was a false positive..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        mtiede @johnpoz
                        last edited by mtiede

                        @johnpoz

                        Yes, I knew it was 2 years old. But since no one answered the question, I thought I would, for the record. His question was, "Has anybody seen this alert from "zoom" before?" Which, in fact, was the question I was trying to answer by searching and finding his post. Yep, both denis__ju and I have seen that alert with zoom. Which is somewhat reassuring that it is a normal thing for zoom to cause this alert.

                        And how do you know that in 2 years some hacker hasn't figured out a way to spread conficker via Android phones? And that hack just happened to get reported when it tried to infect the zoom server?

                        To help someone else, here are the IP addresses and ports used by zoom: https://support.zoom.us/hc/en-us/articles/201362683

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @mtiede
                          last edited by johnpoz

                          @mtiede said in Zoom Alert! (Network Trojan Detected):

                          And that hack just happened to get reported when it tired to infect the zoom server?

                          Common Sense ;) Yeah 2 years ago android phones were spreading conflicker talking to zoom IPs.. And that port would be a download of the payload etc, not trying to infect it.. So yeah his the zoom server was being used to spread conflicker - and his android phone was infected..

                          Or I don't know common sense says he uses zoom, and the IPS reported a false positive based on traffic type and port -- anyone that has ever used IPS or IDS for more than 10 minutes knows that is quite common... So yeah common sense..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.