<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: malware.azjf C2 traffic in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448428#M1383</link>
    <description>&lt;P&gt;Same here. I have hits for at least the following sites,(likely more though), however the commonality seems to be the carousel plugin.&lt;BR /&gt;&lt;BR /&gt;As far as I can tell, this is not malicious traffic, rather a false positive match for C2 traffic.&lt;BR /&gt;&lt;BR /&gt;URLs:&lt;BR /&gt;-&amp;nbsp;www[.]toshibaaudio[.]com/wp-content/themes/porto/js/libs/owl.carousel.min.js?ver=2.3.4&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;www[.]thepartnership[.]org/wp-content/plugins/gyan-elements/assets/js/owl.carousel.min.js?ver=2.3.4&lt;/SPAN&gt;&lt;BR /&gt;-&amp;nbsp;uvc[.]org/wp-content/themes/startit/assets/js/modules/plugins/owl.carousel.min.js?ver=5.8.2&lt;BR /&gt;-&amp;nbsp;www[.]integralpartnersllc[.]com/wp-content/themes/integral-partners/js/owl_slider/owl.carousel.min.js?ver=1637146460&lt;/P&gt;</description>
    <pubDate>Thu, 18 Nov 2021 16:21:03 GMT</pubDate>
    <dc:creator>MarshallC</dc:creator>
    <dc:date>2021-11-18T16:21:03Z</dc:date>
    <item>
      <title>malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448392#M1381</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am seeing a lot of traffic being identified as&amp;nbsp;&lt;SPAN&gt;malware.azjf C2 traffic over the last couple of days since the last threat update. I have noticed a pattern that users are visiting Wordpress websites that use the owl carousel plugin and checking these sites on VT they come up clean so appears to be a false positive.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is anyone else aware of this going on?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 13:13:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448392#M1381</guid>
      <dc:creator>MichaelWrigh</dc:creator>
      <dc:date>2021-11-18T13:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448417#M1382</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have came across one from 17 November 2021. Same here, it points to a WordPress site with a carousel plugin.&lt;/P&gt;&lt;P&gt;Here are the IOCs:&lt;/P&gt;&lt;P&gt;IP: 194.72.147.94 on port 443&lt;/P&gt;&lt;P&gt;urls:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;brunepark[.]gfmat[.]org&lt;/LI&gt;&lt;LI&gt;brunepark[.]gfmat[.]org/wp-content/plugins/js_composer/assets/lib/owl-carousel2-dist/owl.carousel.min.js?ver=6.0.5&lt;/LI&gt;&lt;LI&gt;brunepark[.]gfmat[.]org/wp-content/themes/ed-school/assets/fonts/ed-icon.ttf?nj4a9z&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 16:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448417#M1382</guid>
      <dc:creator>gkabacs</dc:creator>
      <dc:date>2021-11-18T16:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448428#M1383</link>
      <description>&lt;P&gt;Same here. I have hits for at least the following sites,(likely more though), however the commonality seems to be the carousel plugin.&lt;BR /&gt;&lt;BR /&gt;As far as I can tell, this is not malicious traffic, rather a false positive match for C2 traffic.&lt;BR /&gt;&lt;BR /&gt;URLs:&lt;BR /&gt;-&amp;nbsp;www[.]toshibaaudio[.]com/wp-content/themes/porto/js/libs/owl.carousel.min.js?ver=2.3.4&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;www[.]thepartnership[.]org/wp-content/plugins/gyan-elements/assets/js/owl.carousel.min.js?ver=2.3.4&lt;/SPAN&gt;&lt;BR /&gt;-&amp;nbsp;uvc[.]org/wp-content/themes/startit/assets/js/modules/plugins/owl.carousel.min.js?ver=5.8.2&lt;BR /&gt;-&amp;nbsp;www[.]integralpartnersllc[.]com/wp-content/themes/integral-partners/js/owl_slider/owl.carousel.min.js?ver=1637146460&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 16:21:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448428#M1383</guid>
      <dc:creator>MarshallC</dc:creator>
      <dc:date>2021-11-18T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448591#M1384</link>
      <description>&lt;P&gt;Palo Alto Networks confirmed that it was a False Positive. The signature "malware.azjf C2 traffic(446823108)" will be disabled in Anti-Virus version 3905.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 01:32:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448591#M1384</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2021-11-19T01:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448609#M1385</link>
      <description>&lt;P&gt;Hi ! can u let us know, where did you get this? the official quote pelase&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 07:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448609#M1385</guid>
      <dc:creator>CyberSOC.Support</dc:creator>
      <dc:date>2021-11-19T07:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: malware.azjf C2 traffic</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448630#M1386</link>
      <description>&lt;P&gt;I'm a Palo Alto Networks employee, so I can check the signature status. (I just updated my profile with a job title.)&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 09:26:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/malware-azjf-c2-traffic/m-p/448630#M1386</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2021-11-19T09:26:10Z</dc:date>
    </item>
  </channel>
</rss>

