<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Badbox malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248981#M126053</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/305423"&gt;@JamesHodge&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;is correct about the DNS sinkhole tracking, but there's a catch to this working.&amp;nbsp; You will need to have a firewall inline between the client and DNS lookup request for the bad domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to be clear, the process goes like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A:&amp;nbsp; Client (requests lookup for malicious domain) --&amp;gt; B:&amp;nbsp; Request sent to internal DNS --&amp;gt; C:&amp;nbsp; Request sent to internal root forwards (for external domain lookup, usually in your DMZ) --&amp;gt; D : Internet DNS responds to root forwarders&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order for you to be able to identify the actual source of the lookup you need to have the Palo firewall in-between steps A &amp;amp; B.&amp;nbsp; If your firewall is anywhere after that the Palo will just say the server in step B or C is the "source" of the malware, because from the firewall's perspective that's the server that's actually asking for the domain info.&amp;nbsp; And if this is the case you'd need to turn on logging on your DNS servers to see the IP client (source) that's requesting that bad domain.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Feb 2026 13:40:59 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2026-02-25T13:40:59Z</dc:date>
    <item>
      <title>Badbox malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248978#M126051</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Our ISP keeps alerting us that we have a malware infection with something called android.badbox somewhere on our network but the source as they see it is our DNS server. They've provided the DNS query which they're seeing (for an A record) but we don't have the facility to log client queries on our DNS system. We've searched the paloalto threat log but can't see anything matching the DNS query. Does anyone have a suggestion on how we could track down the responsible internal system please?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;James&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 11:52:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248978#M126051</guid>
      <dc:creator>JamesHodge</dc:creator>
      <dc:date>2026-02-25T11:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Badbox malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248979#M126052</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/305423"&gt;@JamesHodge&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;This is a visibility gap when internal DNS servers are used.&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;&lt;SPAN class="citation-35 citation-end-35"&gt;Because the client asks the internal DNS server, and the server asks the internet, the Palo Alto only sees the DNS server's IP as the source.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;&lt;SPAN class="citation-34"&gt;To find the infected device without logging on the DNS server itself, you could use &lt;/SPAN&gt;&lt;SPAN class="citation-34"&gt;DNS sinkholing:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;&lt;STRONG&gt;&lt;SPAN class="citation-34"&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-threat-prevention/administration/configure-threat-prevention/use-dns-queries-to-identify-infected-hosts-on-the-network/configure-dns-sinkholing" target="_self"&gt;use-dns-queries-to-identify-infected-hosts-on-the-network - configure-dns-sinkholing&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 data-path-to-node="12"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;P data-path-to-node="13"&gt;If you can't use Sinkholing, you can try a Packet Capture (PCAP) on the firewall, but this is a "needle in a haystack" approach:&lt;/P&gt;
&lt;OL start="1" data-path-to-node="14"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,0,0"&gt;Set a Packet Filter for port 53 and the IP of your DNS server.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,1,0"&gt;Run the capture.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,2,0"&gt;Open the PCAP in Wireshark and filter by the malicious domain name: dns.qry.name contains "badboxdomain".&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="14,3,0"&gt;But even then, if the DNS server is the one making the query to the internet, the PCAP will likely still show the DNS server's IP.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have the appropriate licenses, sinkholing is the only reliable way to catch the client "in the act" as it tries to reach out to the fake IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 12:39:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248979#M126052</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-02-25T12:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Badbox malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248981#M126053</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/305423"&gt;@JamesHodge&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt;&amp;nbsp;is correct about the DNS sinkhole tracking, but there's a catch to this working.&amp;nbsp; You will need to have a firewall inline between the client and DNS lookup request for the bad domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to be clear, the process goes like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A:&amp;nbsp; Client (requests lookup for malicious domain) --&amp;gt; B:&amp;nbsp; Request sent to internal DNS --&amp;gt; C:&amp;nbsp; Request sent to internal root forwards (for external domain lookup, usually in your DMZ) --&amp;gt; D : Internet DNS responds to root forwarders&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order for you to be able to identify the actual source of the lookup you need to have the Palo firewall in-between steps A &amp;amp; B.&amp;nbsp; If your firewall is anywhere after that the Palo will just say the server in step B or C is the "source" of the malware, because from the firewall's perspective that's the server that's actually asking for the domain info.&amp;nbsp; And if this is the case you'd need to turn on logging on your DNS servers to see the IP client (source) that's requesting that bad domain.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2026 13:40:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/badbox-malware/m-p/1248981#M126053</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-02-25T13:40:59Z</dc:date>
    </item>
  </channel>
</rss>

