Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort alarm - confirm false positive?

    Scheduled Pinned Locked Moved pfSense Packages
    16 Posts 5 Posters 3.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      Guest
      last edited by

      No Wine.

      RogueKiller found nothing (besides some non-whitelisted drivers which are non-malignant, I think after googeling around a little).

      I think I could provoke the connection to this strange server by opening the bookmark for my The Guardian subscription at

      http://guardian.newspaperdirect.com/epaper/viewer.aspx

      But not every time I try to connect to this I get an alarm from snort.

      I cannot access the newspaper since…. YESTERDAY! Strange...

      But maybe this is the solution.

      EDIT:

      It' The Guardian online edition causing the alarm:

      It'S trrying to access

      cache2-scripts.pressdisplay.com

      which resolves to the IP of the snort rule...

      Any way to report this to the snort ET rules team for a noob?  :-[

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by

        @chemlud:

        No Wine.

        RogueKiller found nothing (besides some non-whitelisted drivers which are non-malignant, I think after googeling around a little).

        I think I could provoke the connection to this strange server by opening the bookmark for my The Guardian subscription at

        http://guardian.newspaperdirect.com/epaper/viewer.aspx

        But not every time I try to connect to this I get an alarm from snort.

        I cannot access the newspaper since…. YESTERDAY! Strange...

        But maybe this is the solution.

        EDIT:

        It' The Guardian online edition causing the alarm:

        It'S trrying to access

        cache2-scripts.pressdisplay.com

        which resolves to the IP of the snort rule...

        Any way to report this to the snort ET rules team for a noob?  :-[
        [/quote]

        I think there is a Snort VRT mailing list, but I don't have the link handy.  Try poking around on the https://www.snorg.org web site or at the VRT blog site (link to it is posted on the main Snort site).

        Bill

        1 Reply Last reply Reply Quote 0
        • ?
          Guest
          last edited by

          Yeah, been there but thought there is a more direct way… I will send an eMail to the mailer address

          Thanx for helping out with this strange issue.

          :o

          1 Reply Last reply Reply Quote 0
          • D
            digdug3
            last edited by

            BUT it's still strange that your pc is trying to connect to port 137 (netbios). Port 80 I can understand.

            1 Reply Last reply Reply Quote 0
            • ?
              Guest
              last edited by

              Yep, the netbios thing was from Windows… Maybe someone is interested in readers of The Guardian? ;-)

              1 Reply Last reply Reply Quote 0
              • D
                digdug3
                last edited by

                Just check your system the next couple of days, just to on the safe side… Zeus is a really nasty one.

                1 Reply Last reply Reply Quote 0
                • ?
                  Guest
                  last edited by

                  The point is: I actually use the Linux 99.999% of the time and besides avast I found no antivirus (forget about Clam…), so how to find it under Linux?

                  An infection of the Windows HDDs (SAS RAID1) should not be effective while on Linux (SATA software RAID1), no?

                  1 Reply Last reply Reply Quote 0
                  • D
                    digdug3
                    last edited by

                    No it shouldn't (since you don't use Wine). And as far as I know Zeus is a Windows Trojan and not a boot/mbr virus.

                    1 Reply Last reply Reply Quote 0
                    • ?
                      Guest
                      last edited by

                      Little (final?) update:

                      Guardian works, since 1-2 hours,

                      cache2-scripts.pressdisplay.com still resolves to the IP of the snort rule, but

                      the server does not respond any longer to pings,

                      and the snort rule is still in place, got no reply (except that my eMail is under evaluation, as I'm not on the mailing list…)

                      Somewhat strange---

                      1 Reply Last reply Reply Quote 0
                      • J
                        Jack-proteclouth
                        last edited by

                        Snort can take packet captures from the time when the event is triggered, I cannot remember if this is enabled by default.

                        If you goto Alerts, then click download you'll get a Archive hopefully with a capture file (Although the extension is usually a timestamp I think)

                        I usually open it in wireshark and take a look at what traffic is actually going to the IP address triggering the alert, this helps me make a decision.

                        1 Reply Last reply Reply Quote 0
                        • ?
                          Guest
                          last edited by

                          Yeah! Works!

                          If you want to see the whole log PM me your eMail, I don't think that I should post it here, no?

                          I'm not an expert with wireshark, do you see anything suspicious? :)

                          PS: Something is special with this Guardian page, anyways, as sometime when I try to log in to my subscription I'm locked out and get an alarm that my login tries have been rate limited (is someone trying to hack my account by brute force :o ?)…

                          ![zeus 10.09.2014.jpg](/public/imported_attachments/1/zeus 10.09.2014.jpg)
                          ![zeus 10.09.2014.jpg_thumb](/public/imported_attachments/1/zeus 10.09.2014.jpg_thumb)

                          1 Reply Last reply Reply Quote 0
                          • BBcan177B
                            BBcan177 Moderator
                            last edited by

                            That IP is currently listed on a Threat Source called "Alienvault"

                            http://kb.bothunter.net/ipInfo/nowait.php?IP=93.184.220.20
                            –-------------------------------------------------------
                                  IP Address        = 93.184.220.20
                                  Threat Level      = Unverified
                                  Threat Category    = Malware Propagator
                                  Threat Description = Malware drive-by exploit site
                                  Hostname          =
                                  Service Provider  = EDGECAST NETWORKS INC
                                  Domain Name        = EDGECASTCDN.NET
                                  ASN Number        =
                                  ASN Name          =
                                  Network Speed      = DSL
                                  Country CC        = US
                                  Country            = UNITED STATES
                                  Region            = CALIFORNIA
                                  City              = LOS ANGELES
                                  Longitude          = -118.283996582031
                                  Latitude          = 34.0452003479004
                                  Zipcode            = 90001
                                  TimeZone          = -08:00
                                  BestAnswer        = 1
                            --------------- thank you for asking --------------------

                            Would be wise to use pfBlocker with that Threat source and block that from your network completely.

                            https://reputation.alienvault.com/reputation.snort

                            "Experience is something you don't get until just after you need it."

                            Website: http://pfBlockerNG.com
                            Twitter: @BBcan177  #pfBlockerNG
                            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.