<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cobalt Strike Potential Command and Control Traffic(18927) in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255433#M521</link>
    <description>&lt;P&gt;We are seeing what we think are false postives with this signature.&amp;nbsp; We see lots of OCSP traffic from Amazon and others that has space after the 200 OK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;POST / HTTP/1.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Connection: Keep-Alive&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Type: application/ocsp-request&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Accept: */*&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;User-Agent: Entrust Entelligence Security Provider&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Length: 121&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Host: ocsp.rootg2.amazontrust.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0w0u.....0N0L0J0...+.......}.D^g.|.wNC..&amp;gt;...s...._.....0+8...mJ..........J*'.....+.........0.0.. +.....0...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0.. +.....0..&lt;/SPAN&gt;&lt;SPAN&gt;HTTP/1.1 200 OK &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Type: application/ocsp-response&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Length: 1546&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Connection: keep-alive&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Date: Fri, 29 Mar 2019 09:56:06 GMT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Server: WEBrick/1.3.1 (Ruby/2.3.8/2018-10-18)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;X-Cache: Miss from cloudfront&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Via: 1.1 048de604b26de968a1aa2fe5dd1a0085.cloudfront.net (CloudFront)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;X-Amz-Cf-Id: xuBEvyqfYSM9Hr0TcWIUJ-CL-n_a8enx3EmVPtId3MItOJgncm_6ew==&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 663px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19283i2A5CA0D304FE4095/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2019 15:40:54 GMT</pubDate>
    <dc:creator>PaulT</dc:creator>
    <dc:date>2019-03-29T15:40:54Z</dc:date>
    <item>
      <title>Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255251#M515</link>
      <description>&lt;P&gt;Anyone seeing this new signature as FP prone?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 11:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255251#M515</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2019-03-28T11:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255294#M517</link>
      <description>&lt;P&gt;We haven't seen any reported at this point.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 17:58:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255294#M517</guid>
      <dc:creator>nigelswift</dc:creator>
      <dc:date>2019-03-28T17:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255336#M518</link>
      <description>&lt;P&gt;The signature is meant to detect&lt;SPAN&gt;&amp;nbsp;an empty space in "HTTP/1.1 200 OK " (right after the OK) in HTTP responses, which may indicate a connection with a NanoHTTPD server, which is 'typically' used in Cobalt Strike's team server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you see other HTTPD implementations inserting the "extraneous space", do let us know.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;More information available at:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://blog.fox-it.com/2019/02/26/identifying-cobalt-strike-team-servers-in-the-wild/" target="_blank" rel="noopener"&gt;https://blog.fox-it.com/2019/02/26/identifying-cobalt-strike-team-servers-in-the-wild/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 22:51:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255336#M518</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2019-03-28T22:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255337#M519</link>
      <description>&lt;P&gt;Hi, yes, I guessed that might be what you defined the signature for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are seeing hits on this, obviously hoping that it’s a false positive.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems to be triggering on valid websites as far as we can tell, and it’s not just one, so either there are a lot of compromised commercial websites or it’s too sensitive. &amp;nbsp;I can provide the packet captures as necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 23:00:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255337#M519</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2019-03-28T23:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255348#M520</link>
      <description>&lt;P&gt;As a FYI here are three domains we're seeing hits on:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.merrell.com" target="_blank"&gt;www.merrell.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.belk.com" target="_blank"&gt;www.belk.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.hotelchocolat.com" target="_blank"&gt;www.hotelchocolat.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 01:09:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255348#M520</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2019-03-29T01:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255433#M521</link>
      <description>&lt;P&gt;We are seeing what we think are false postives with this signature.&amp;nbsp; We see lots of OCSP traffic from Amazon and others that has space after the 200 OK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;POST / HTTP/1.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Connection: Keep-Alive&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Type: application/ocsp-request&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Accept: */*&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;User-Agent: Entrust Entelligence Security Provider&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Length: 121&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Host: ocsp.rootg2.amazontrust.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0w0u.....0N0L0J0...+.......}.D^g.|.wNC..&amp;gt;...s...._.....0+8...mJ..........J*'.....+.........0.0.. +.....0...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0.. +.....0..&lt;/SPAN&gt;&lt;SPAN&gt;HTTP/1.1 200 OK &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Type: application/ocsp-response&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Content-Length: 1546&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Connection: keep-alive&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Date: Fri, 29 Mar 2019 09:56:06 GMT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Server: WEBrick/1.3.1 (Ruby/2.3.8/2018-10-18)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;X-Cache: Miss from cloudfront&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Via: 1.1 048de604b26de968a1aa2fe5dd1a0085.cloudfront.net (CloudFront)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;X-Amz-Cf-Id: xuBEvyqfYSM9Hr0TcWIUJ-CL-n_a8enx3EmVPtId3MItOJgncm_6ew==&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 663px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19283i2A5CA0D304FE4095/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 15:40:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255433#M521</guid>
      <dc:creator>PaulT</dc:creator>
      <dc:date>2019-03-29T15:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255581#M522</link>
      <description>&lt;P&gt;We are also see ing lots of hits for&amp;nbsp; this signature on ocsp.rootca1.amazontrust.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 06:48:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255581#M522</guid>
      <dc:creator>ChrisThuys</dc:creator>
      <dc:date>2019-04-01T06:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255629#M523</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have also the same threats traffic detected on our Palo devices and watching to the traffic itself it seems to be ocsp traffic on serveral legitimate servers around amazon, cloudfront...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we safely consider this traffic as false positive detection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guillaume&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 09:15:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255629#M523</guid>
      <dc:creator>GuillaumeD</dc:creator>
      <dc:date>2019-04-02T09:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255639#M524</link>
      <description>&lt;P&gt;I believe that's the reason why this was named "Potential" with "informational" severity. Its definition hints you that the signature is lose enough to be FP prone.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Apr 2019 16:42:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255639#M524</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2019-04-01T16:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255908#M525</link>
      <description>&lt;P&gt;Here's a few domains that have been triggering the FP for us:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;store.moma.org&lt;BR /&gt;&lt;A href="http://www.saucony.com" target="_blank"&gt;www.saucony.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.bcbg.com" target="_blank"&gt;www.bcbg.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The common denominator seems to be shopping (apparently all our users do) and that all the IPs are hosted on Cloudflare.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;- Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 15:09:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/255908#M525</guid>
      <dc:creator>stevenkadish</dc:creator>
      <dc:date>2019-04-03T15:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cobalt Strike Potential Command and Control Traffic(18927)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/256515#M535</link>
      <description>&lt;P&gt;This has been fixed by removing the signature for "Cobalt Strike Potential Command and Control Traffic (18927)" in content version 1840 due to the reason it creates lot of false positives and Paloalto decided to rework on this signature&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2019 13:10:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cobalt-strike-potential-command-and-control-traffic-18927/m-p/256515#M535</guid>
      <dc:creator>skumar1</dc:creator>
      <dc:date>2019-04-07T13:10:30Z</dc:date>
    </item>
  </channel>
</rss>

