<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PoshC2 false positive in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472280#M1540</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are seeing what appears to be false positive detections for the PoshC2C vulnerability signatures that was released recently. Connections going to Google and BBC, is anyone else seeing the same thing here?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Mar 2022 10:17:48 GMT</pubDate>
    <dc:creator>MichaelWrigh</dc:creator>
    <dc:date>2022-03-11T10:17:48Z</dc:date>
    <item>
      <title>PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472280#M1540</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are seeing what appears to be false positive detections for the PoshC2C vulnerability signatures that was released recently. Connections going to Google and BBC, is anyone else seeing the same thing here?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 10:17:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472280#M1540</guid>
      <dc:creator>MichaelWrigh</dc:creator>
      <dc:date>2022-03-11T10:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472349#M1541</link>
      <description>&lt;P&gt;I think I'm seeing this too. I have a particular user where I'm seeing this when they click the google logo to go back to the main search page. I'm getting&amp;nbsp;&lt;SPAN&gt;Threat ID: 86523&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 15:07:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472349#M1541</guid>
      <dc:creator>lvultao</dc:creator>
      <dc:date>2022-03-11T15:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472365#M1542</link>
      <description>&lt;P&gt;Confirmed. I just tried the same and got the alert for PoshC2 (ThreatID: 86523, release 8540 2022-03-10). Extremely easy to replicate:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;1) Do a Google search&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;2) Click the Google logo on the search results page&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;3) Page redirects to hxxps://google.com/webhp?hl=en&amp;amp;sa=X&amp;amp;ved=&amp;lt;trackingID&amp;gt; and is blocked as a threat&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 15:37:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472365#M1542</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-11T15:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472451#M1543</link>
      <description>&lt;P&gt;It appears that the rule looks for the URL strings listed on github[.]com/johnjohnsp1/PoshC2_Python/blob/master/Config.py:&lt;/P&gt;&lt;P&gt;URLS = '"adsense/troubleshooter/1631343/","adServingData/PROD/TMClient/6/8736/","advanced_search?hl=en-GB&amp;amp;fg=","async/newtab?ei=","babel-polyfill/6.3.14/polyfill.min.js=","bh/sync/aol?rurl=/ups/55972/sync?origin=","bootstrap/3.1.1/bootstrap.min.js?p=","branch-locator/search.asp?WT.ac&amp;amp;api=","business/home.asp&amp;amp;ved=","business/retail-business/insurance.asp?WT.mc_id=","cdb?ptv=48&amp;amp;profileId=125&amp;amp;av=1&amp;amp;cb=","cis/marketq?bartype=AREA&amp;amp;showheader=FALSE&amp;amp;showvaluemarkers=","classroom/sharewidget/widget_stable.html?usegapi=","client_204?&amp;amp;atyp=i&amp;amp;biw=1920&amp;amp;bih=921&amp;amp;ei=","load/pages/index.php?t=","putil/2018/0/11/po.html?ved=","q/2018/load.php?lang=en&amp;amp;modules=","status/995598521343541248/query=","TOS?loc=GB&amp;amp;hl=en&amp;amp;privacy=","trader-update/history&amp;amp;pd=","types/translation/v1/articles/","uasclient/0.1.34/modules/","usersync/tradedesk/","utag/lbg/main/prod/utag.15.js?utv=","vs/1/vsopts.js?","vs/site/bgroup/visitor/","w/load.php?debug=false&amp;amp;lang=en&amp;amp;modules=","web/20110920084728/","webhp?hl=en&amp;amp;sa=X&amp;amp;ved=","work/embedded/search?oid="'&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 18:56:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472451#M1543</guid>
      <dc:creator>SecurityEngineering</dc:creator>
      <dc:date>2022-03-11T18:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472473#M1544</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/212472"&gt;@SecurityEngineering&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;&amp;nbsp; "webhp?hl=en&amp;amp;sa=X&amp;amp;ved="&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Bingo.... that is the path of the Google redirect back to the main search page.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62978"&gt;@MichaelWrigh&lt;/a&gt;&amp;nbsp; Have you opened a false alert report with PA?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 19:50:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472473#M1544</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-11T19:50:54Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472922#M1545</link>
      <description>&lt;P&gt;Not yet, am hoping to get it done soon though. Am on a training course this week but should be bale to find the time.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 16:52:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472922#M1545</guid>
      <dc:creator>MichaelWrigh</dc:creator>
      <dc:date>2022-03-14T16:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: PoshC2 false positive</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472928#M1546</link>
      <description>&lt;P&gt;It looks like someone has already submitted a false positive report. The 8541 release has a single note about improving PoshC2 detection. Testing against Google I am no longer seeing the false alert.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 17:01:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/poshc2-false-positive/m-p/472928#M1546</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-03-14T17:01:27Z</dc:date>
    </item>
  </channel>
</rss>

