Snort alarm - confirm false positive?
-
Yeah, been there but thought there is a more direct way… I will send an eMail to the mailer address
Thanx for helping out with this strange issue.
:o
-
BUT it's still strange that your pc is trying to connect to port 137 (netbios). Port 80 I can understand.
-
Yep, the netbios thing was from Windows… Maybe someone is interested in readers of The Guardian? ;-)
-
Just check your system the next couple of days, just to on the safe side… Zeus is a really nasty one.
-
The point is: I actually use the Linux 99.999% of the time and besides avast I found no antivirus (forget about Clam…), so how to find it under Linux?
An infection of the Windows HDDs (SAS RAID1) should not be effective while on Linux (SATA software RAID1), no?
-
No it shouldn't (since you don't use Wine). And as far as I know Zeus is a Windows Trojan and not a boot/mbr virus.
-
Little (final?) update:
Guardian works, since 1-2 hours,
cache2-scripts.pressdisplay.com still resolves to the IP of the snort rule, but
the server does not respond any longer to pings,
and the snort rule is still in place, got no reply (except that my eMail is under evaluation, as I'm not on the mailing list…)
Somewhat strange---
-
Snort can take packet captures from the time when the event is triggered, I cannot remember if this is enabled by default.
If you goto Alerts, then click download you'll get a Archive hopefully with a capture file (Although the extension is usually a timestamp I think)
I usually open it in wireshark and take a look at what traffic is actually going to the IP address triggering the alert, this helps me make a decision.
-
Yeah! Works!
If you want to see the whole log PM me your eMail, I don't think that I should post it here, no?
I'm not an expert with wireshark, do you see anything suspicious? :)
PS: Something is special with this Guardian page, anyways, as sometime when I try to log in to my subscription I'm locked out and get an alarm that my login tries have been rate limited (is someone trying to hack my account by brute force :o ?)…
![zeus 10.09.2014.jpg](/public/imported_attachments/1/zeus 10.09.2014.jpg)
![zeus 10.09.2014.jpg_thumb](/public/imported_attachments/1/zeus 10.09.2014.jpg_thumb) -
That IP is currently listed on a Threat Source called "Alienvault"
http://kb.bothunter.net/ipInfo/nowait.php?IP=93.184.220.20
–-------------------------------------------------------
IP Address = 93.184.220.20
Threat Level = Unverified
Threat Category = Malware Propagator
Threat Description = Malware drive-by exploit site
Hostname =
Service Provider = EDGECAST NETWORKS INC
Domain Name = EDGECASTCDN.NET
ASN Number =
ASN Name =
Network Speed = DSL
Country CC = US
Country = UNITED STATES
Region = CALIFORNIA
City = LOS ANGELES
Longitude = -118.283996582031
Latitude = 34.0452003479004
Zipcode = 90001
TimeZone = -08:00
BestAnswer = 1
--------------- thank you for asking --------------------Would be wise to use pfBlocker with that Threat source and block that from your network completely.
https://reputation.alienvault.com/reputation.snort