Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Snort alert due to .pw DNS request : rule 1:28039

    Scheduled Pinned Locked Moved IDS/IPS
    16 Posts 6 Posters 7.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 2
      2chemlud Banned
      last edited by

      Hi everybody!

      I have a strange snort alert since yesterday, at first every hour, stopping at 22:32 yesterday (no browser open at that time, nobody sitting at the computer).

      Now today it started again at 18:01, 18:31, 19:02, 19:12, 19:32, 19:38

      The alert says there is a "suspicious .pw dns request" and warns of "A Network Trojan detected".

      I did a package capture and found the address requested is for

      cahoots.pw

      which is according to google a website to visualize journalist networks or something like that via a Firefox plugin. I have no such plugin installed.

      Why does snort alert for these .pw DNS requests?

      How to find the application sending these requests?

      The system is an openSuse 13.2 x64 (dual boot with Win 7 64, no wine, Windows not started for days).

      I haven't installed any software recently, but made some regime-unfriendly posts against the NSA on a security forum yesterday :-)

      Any suggestions? Any help highly appreciated!

      Kind regards

      chemlud

      1 Reply Last reply Reply Quote 0
      • bmeeksB
        bmeeks
        last edited by

        I've seen these sporadically in the past.  In my case they did not represent actual Trojans.  Could be some syndicated ad network causing it.

        Also, don't worry about offending the NSA.  If they want to compromise your network, you can bet they are not dumb enough to trigger an IDS/IPS with their work… ;).  You would never know they had been there until some future Edward Snowden leaked more secrets.

        Bill

        1 Reply Last reply Reply Quote 0
        • 2
          2chemlud Banned
          last edited by

          Hi Bill!

          Many thanks for taking time to give me info! Highly appreciated every time.

          May I ask what a "syndicated ad network" is? :-)

          Any idea how to find the culprit process on the machine initiating the DNS request? Even if I find the events with a long-term wireshark I have no idea where look for the respective process.

          Kind regards

          chemlud

          1 Reply Last reply Reply Quote 0
          • 2
            2chemlud Banned
            last edited by

            Update:

            Same alert (Thursday, Friday evening) for same cachoots.pw domain DNS request in another network, on a Windows 7 64 computer.

            Why that?

            Very strange. What is trying to resolve this strange page?

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @2chemlud:

              Hi Bill!

              Many thanks for taking time to give me info! Highly appreciated every time.

              May I ask what a "syndicated ad network" is? :-)

              Any idea how to find the culprit process on the machine initiating the DNS request? Even if I find the events with a long-term wireshark I have no idea where look for the respective process.

              Kind regards

              chemlud

              Are you running Snort on your LAN interface?  If so, the alert should show the local IP address that initiated the request.  If you run Snort only on the WAN, then Snort only sees your local outbound traffic after it has been NAT'd, and inbound traffic only before it has been NAT'd.  In other words, Snort running on your WAN can never show you which LAN client is the source or destination of alerts.  Only your WAN IP will show.

              So if you are running Snort on just your WAN, I suggest moving it to your LAN instead.  You can do this easily on the SNORT INTERFACES tab.  Just change the interface drop-down box "lan" from "wan".

              Bill

              1 Reply Last reply Reply Quote 0
              • 2
                2chemlud Banned
                last edited by

                Hi!

                Always running on LAN… I see the IPs of the computers initiating the DNS request for cahoots.pw, but have no idea why in one network a Linux machine and in a totally different network (different router, different internet connection) a Windows 7 machine should try to reach the same cahoots.pw.

                It's a miracle to me, what is initiating the request, no user sitting in front of the machine, no browser open...

                regards

                chemlud

                1 Reply Last reply Reply Quote 0
                • 2
                  2chemlud Banned
                  last edited by

                  Update:

                  The Windows 7 machine with the alerts is also dual boot, with Opensuse 13.1

                  From Yesterday on (AFTER the alerts) I booted it to Linux and let it run the whole day.

                  This evenening (as al LINUX machine !) it tried to access the same cahoots.pw at 18:06, 19:06, 20:06, for 4 (four) times each.

                  It simply does not matter which OS is running, the requests are initiated anyway.

                  I don't get this.

                  1 Reply Last reply Reply Quote 0
                  • T
                    turker
                    last edited by

                    @bmeeks:

                    @2chemlud:

                    Hi Bill!

                    Many thanks for taking time to give me info! Highly appreciated every time.

                    May I ask what a "syndicated ad network" is? :-)

                    Any idea how to find the culprit process on the machine initiating the DNS request? Even if I find the events with a long-term wireshark I have no idea where look for the respective process.

                    Kind regards

                    chemlud

                    Are you running Snort on your LAN interface?  If so, the alert should show the local IP address that initiated the request.  If you run Snort only on the WAN, then Snort only sees your local outbound traffic after it has been NAT'd, and inbound traffic only before it has been NAT'd.  In other words, Snort running on your WAN can never show you which LAN client is the source or destination of alerts.  Only your WAN IP will show.

                    So if you are running Snort on just your WAN, I suggest moving it to your LAN instead.  You can do this easily on the SNORT INTERFACES tab.  Just change the interface drop-down box "lan" from "wan".

                    Bill

                    When I start it torrent, I get a same warning. But I found it  ;)

                    1 Reply Last reply Reply Quote 0
                    • 2
                      2chemlud Banned
                      last edited by

                      Lucky you! :-)

                      Here no idea which application is causing these requests. Apparently something triggers DNS requests for things visited hours ago even after closing the browser. No idea what is doing this.

                      Some kind of Firefox feature?

                      Addons installed:

                      BetterPrivacy 1.68
                      CipherFox 3.10.1
                      HTTPS-Everywhere 5.0.3
                      NoScript 2.6.9.2
                      SSL Version Control 0.4 (minimum TLS 1.1)

                      1 Reply Last reply Reply Quote 0
                      • T
                        THS
                        last edited by

                        I too am getting bombarded with these alerts. Have yet to figure out why PCs on my network would be sending DNS queries for .PW

                        1 Reply Last reply Reply Quote 0
                        • 2
                          2chemlud Banned
                          last edited by

                          …for me it stopped as suddenly as it began... no idea what was going on here, maybe some kind of infection somewhere in the network, I think I will never know.

                          1 Reply Last reply Reply Quote 0
                          • M
                            Mr. Jingles
                            last edited by

                            Same problem here. Multiple times per minute, completely flooding the alerts tab.

                            "And now for something completely different" ( ;D ):

                            It even does that when nothing is connected to pfSense (unplug the switch, so only pfSense and the modem are connected to each other). I left it running for 30 minutes like that, and after that the log was still flooded like before. I have the same with two other SID's, btw.

                            pfsense_snort_weirds.jpg
                            pfsense_snort_weirds.jpg_thumb

                            6 and a half billion people know that they are stupid, agressive, lower life forms.

                            1 Reply Last reply Reply Quote 0
                            • BBcan177B
                              BBcan177 Moderator
                              last edited by

                              It looks like you have that Snort rule "28039" on the WAN interface… Disable that rule for the WAN, and enable it on the LAN. This will show which LAN IP is making the request ...

                              But if you removed the LAN devices, maybe one of the NTP IPs you defined in pfSense or another service is going to a .pw domain?

                              It doesn't mean that everything in .pw is bad, its just a suspicious behavior…
                              http://blog.talosintel.com/2016/04/enabling-evil.html

                              You can also use the Packet capture GUI feature to collect DNS requests to get more insight.

                              "Experience is something you don't get until just after you need it."

                              Website: http://pfBlockerNG.com
                              Twitter: @BBcan177  #pfBlockerNG
                              Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                              1 Reply Last reply Reply Quote 0
                              • M
                                Mr. Jingles
                                last edited by

                                @BBcan177:

                                It looks like you have that Snort rule "28039" on the WAN interface… Disable that rule for the WAN, and enable it on the LAN. This will show which LAN IP is making the request ...

                                But if you removed the LAN devices, maybe one of the NTP IPs you defined in pfSense or another service is going to a .pw domain?

                                It doesn't mean that everything in .pw is bad, its just a suspicious behavior…
                                http://blog.talosintel.com/2016/04/enabling-evil.html

                                You can also use the Packet capture GUI feature to collect DNS requests to get more insight.

                                BB! ( :-* )

                                Thank you, BB (Latina is almost ready  ;D ;D ;D ).

                                How do you quickly find out in which category that SID is, BB? Is there a way to search? Because browsing through thirty categories is not exactly efficient, dogs want me outside to play with them while the sun shines, not waste hours on browsing to find something  :-[

                                6 and a half billion people know that they are stupid, agressive, lower life forms.

                                1 Reply Last reply Reply Quote 0
                                • BBcan177B
                                  BBcan177 Moderator
                                  last edited by

                                  How do you quickly find out in which category that SID is, BB?

                                  In the screenshot… it says "INDICATOR-COMPROMISE"
                                  So short answer: "Snort-Indicator-Compromise" category…

                                  Looking at the rule, its enabled with the "Balanced" and "Security-policy" setting:

                                  alert udp $HOME_NET any -> any 53 (msg:"INDICATOR-COMPROMISE Suspicious .pw dns query"; flow:to_server; content:!"|01|u|02|pw"; content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2; content:"|02|pw|00|"; distance:0; fast_pattern; metadata:policy balanced-ips alert, policy security-ips drop, service dns; classtype:trojan-activity; sid:28039; rev:5;)
                                  

                                  You can click on the "Disable Sid" Icon in the Alerts, or Blocked Tab, to disable on the WAN… and then goto the "LAN Rules" tab in Snort/Suricata and select the Category "Snort_indicator_compromised.rules" and enable sid 28039. You might need to re-start the Interfaces for it to take effect...

                                  If you find that its a False Positive, you could add a suppress to the LAN Interface suppress List, so the rule will only fire for other .pw domains, excluding this particular DST IP... (Once you figure out which DST IP you want to suppress that is...)

                                  suppress gen_id 1, sig_id 28039, track by_dst, ip x.x.x.x
                                  

                                  "Experience is something you don't get until just after you need it."

                                  Website: http://pfBlockerNG.com
                                  Twitter: @BBcan177  #pfBlockerNG
                                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                                  1 Reply Last reply Reply Quote 0
                                  • M
                                    Mr. Jingles
                                    last edited by

                                    @BBcan177:

                                    How do you quickly find out in which category that SID is, BB?

                                    In the screenshot… it says "INDICATOR-COMPROMISE"
                                    So short answer: "Snort-Indicator-Compromise" category…

                                    Looking at the rule, its enabled with the "Balanced" and "Security-policy" setting:

                                    alert udp $HOME_NET any -> any 53 (msg:"INDICATOR-COMPROMISE Suspicious .pw dns query"; flow:to_server; content:!"|01|u|02|pw"; content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2; content:"|02|pw|00|"; distance:0; fast_pattern; metadata:policy balanced-ips alert, policy security-ips drop, service dns; classtype:trojan-activity; sid:28039; rev:5;)
                                    

                                    You can click on the "Disable Sid" Icon in the Alerts, or Blocked Tab, to disable on the WAN… and then goto the "LAN Rules" tab in Snort/Suricata and select the Category "Snort_indicator_compromised.rules" and enable sid 28039. You might need to re-start the Interfaces for it to take effect...

                                    If you find that its a False Positive, you could add a suppress to the LAN Interface suppress List, so the rule will only fire for other .pw domains, excluding this particular DST IP... (Once you figure out which DST IP you want to suppress that is...)

                                    suppress gen_id 1, sig_id 28039, track by_dst, ip x.x.x.x
                                    

                                    You know I love you with all my heart, BB  :P

                                    But I have no'Snort-Indicator-Compromise'-category, really not ;D Pic to prove**:-*** It turns out I found it, thanks to your tip, in IPS Policy - Security.It was disabled, I enabled it now. Let's see what shows up now.
                                    Thanks BB  :P

                                    BB_daman_hecan.jpg
                                    BB_daman_hecan.jpg_thumb

                                    6 and a half billion people know that they are stupid, agressive, lower life forms.

                                    1 Reply Last reply Reply Quote 0
                                    • First post
                                      Last post
                                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.