Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Attack from aggrosoperations.ltd

    Scheduled Pinned Locked Moved IDS/IPS
    5 Posts 3 Posters 933 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      ASGR71
      last edited by

      Hey Guys and Ladies...

      My 1100 picked up 2 attacks from 45.128.232.126 that is registered to aggrosoperations.ltd in Germany according to ripe.net. When I look at the netname and descr it says that it's Pfcloud. Are these netgate servers?

      These are the details of the attack:
      Class: Attempted Administrator Privilege Gain
      Description: ET EXPLOIT Realtek SDK - Command Execution/Backdoor Access Inbound (CVE-2021-35394)

      I have a feeling that the IP address may have been spoofed! My first reaction was to block the IP but, in hindsight, that may interferre with the device...

      Thanks in advance.

      M 1 Reply Last reply Reply Quote 0
      • M
        michmoor LAYER 8 Rebel Alliance @ASGR71
        last edited by

        @asgr71 I assume you are running IPS on your WAN? Default action is to block all incoming traffic.

        Firewall: NetGate,Palo Alto-VM,Juniper SRX
        Routing: Juniper, Arista, Cisco
        Switching: Juniper, Arista, Cisco
        Wireless: Unifi, Aruba IAP
        JNCIP,CCNP Enterprise

        1 Reply Last reply Reply Quote 0
        • E
          EdIlS0N LiMa
          last edited by

          Boa tarde .. estou pegando os ips que o snort alerta. e colocando em uma block list.. mas isso muda o tempo todo.. destinos diferentes.. existe alguma forma de fazer esse bloqueio. ou o único meio de acabar com esse ataque sera trocar a placa de rede ?

          1 Reply Last reply Reply Quote 0
          • E
            EdIlS0N LiMa
            last edited by EdIlS0N LiMa

            OS QUE PEGUEI ATE AGORA..

            ET EXPLOIT Realtek eCos RSDK/MSDK Stack-based Buffer Overflow Attempt Inbound (CVE-2022-27255)

            151.106.38.215 45.95.55.155 151.106.40.7 36.111.131.176
            176.32.34.56 45.81.243.34 80.94.92.110 45.148.122.69
            138.128.247.175 45.93.16.15 45.128.232.158 45.128.232.126
            45.93.16.56 45.128.232.158

            M 1 Reply Last reply Reply Quote 0
            • M
              michmoor LAYER 8 Rebel Alliance @EdIlS0N LiMa
              last edited by

              @edils0n-lima

              Não ative o Snort na WAN. Isso é inútil, pois a ação padrão do firewall é bloquear. Coloque o Snort na sua LAN.

              Do not enable Snort on the WAN. That is pointless to do as the default action of the firewall is to block. Place Snort on your LAN.

              Firewall: NetGate,Palo Alto-VM,Juniper SRX
              Routing: Juniper, Arista, Cisco
              Switching: Juniper, Arista, Cisco
              Wireless: Unifi, Aruba IAP
              JNCIP,CCNP Enterprise

              1 Reply Last reply Reply Quote 0
              • First post
                Last post
              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.