<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS attack? False positive: urussynonumsantonums.com in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22261#M16224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Djdove007,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please open a TAC ticket for verification.&lt;/P&gt;&lt;P&gt;Virustotal doesn't detect it as virus.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/" style="font-size: 10pt; line-height: 1.5em;" title="https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/"&gt;https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But Bright Cloud think its as malicious. Only TAC can verify this.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.brightcloud.com/tools/url-ip-lookup.php" title="http://www.brightcloud.com/tools/url-ip-lookup.php"&gt;URL/IP Lookup | Webroot BrightCloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Mar 2015 19:23:04 GMT</pubDate>
    <dc:creator>hshah</dc:creator>
    <dc:date>2015-03-06T19:23:04Z</dc:date>
    <item>
      <title>DNS attack? False positive: urussynonumsantonums.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22259#M16222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to this realm so please note if I ask alot of questions, you all have the answers.&amp;nbsp; I have a PA device that has been spitting out multiple, multiple, and multiple Threat notices for the above domain: &lt;SPAN style="font-size: 13.3333330154419px;"&gt;urussynonumsantonums.com. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen some threads where PA updated their threat database to 80,000 new entries. Plus there was an error in one of the most current loads and users were reverting back to the previous AV, Threat, Container DB's to resolve the issue.&amp;nbsp;&amp;nbsp; Is anyone getting the same Threat emailed about 100 times. It is not constant, but when it happens it lasts for about 3 minutes, then goes away.&amp;nbsp; I have scanned my network and all computers and servers for viruses, malware,etc. I have found nothing.&amp;nbsp; Hopefully I am not chasing a ghost here. Below is a snipit from my alert with sensitive information removed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain: 1&lt;BR /&gt; receive_time: 2015/03/06 12:47:23&lt;BR /&gt; serial: &lt;BR /&gt; seqno: &lt;BR /&gt; actionflags: 0x0&lt;BR /&gt; type: THREAT&lt;BR /&gt; subtype: spyware&lt;BR /&gt; config_ver: 1&lt;BR /&gt; time_generated: 2015/03/06 12:47:18&lt;BR /&gt; src: 192.168.0.1&lt;BR /&gt; dst: 192.5.6.30&lt;BR /&gt; natsrc: &lt;BR /&gt; natdst: 192.5.6.30&lt;BR /&gt; rule: LAN to External&lt;BR /&gt; srcuser: &lt;BR /&gt; dstuser: &lt;BR /&gt; srcloc: 192.168.0.0-192.168.255.255&lt;BR /&gt; dstloc: US&lt;BR /&gt; app: dns&lt;BR /&gt; vsys: vsys1&lt;BR /&gt; from: private-&lt;BR /&gt; to: public--Out&lt;BR /&gt; inbound_if: ethernet1/1&lt;BR /&gt; outbound_if: ethernet1/16&lt;BR /&gt; logset: log forward&lt;BR /&gt; time_received: 2015/03/06 12:47:22&lt;BR /&gt; sessionid: 37009&lt;BR /&gt; repeatcnt: 1&lt;BR /&gt; sport: 37998&lt;BR /&gt; dport: 53&lt;BR /&gt; natsport: 17914&lt;BR /&gt; natdport: 53&lt;BR /&gt; flags: 0x400000&lt;BR /&gt; proto: udp&lt;BR /&gt; action: drop-all-packets&lt;BR /&gt; cpadding: 0&lt;BR /&gt; threatid: Suspicious DNS Query (generic:urussynonumsantonums.com)(4038556)&lt;BR /&gt; category: any&lt;BR /&gt; contenttype: &lt;BR /&gt; behavior: 0x0300000000000000000000000000000000000000000000000000000000000000&lt;BR /&gt; severit! y: medium&lt;BR /&gt; direction: client-to-server&lt;BR /&gt; misc: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated. &lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;DB&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 18:10:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22259#M16222</guid>
      <dc:creator>djdove007</dc:creator>
      <dc:date>2015-03-06T18:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: DNS attack? False positive: urussynonumsantonums.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22260#M16223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A quick check on brightcloud reveals the site to be less than a month old. And since spyware is picking up the url, that means this url might possibly be involved in malicious activity. You need to find why source 192.168.0.1 is trying to resolve the url. Was that done on purpose or some application are trying to resolve it. Most the sites that are relatively new would be up for short time and then vanish after the purpose is fulfilled. That host in question might be compromised as well. Hope this helps.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 18:21:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22260#M16223</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2015-03-06T18:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: DNS attack? False positive: urussynonumsantonums.com</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22261#M16224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Djdove007,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please open a TAC ticket for verification.&lt;/P&gt;&lt;P&gt;Virustotal doesn't detect it as virus.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/" style="font-size: 10pt; line-height: 1.5em;" title="https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/"&gt;https://www.virustotal.com/en/url/092b2b1e35ab59ff51382169d9efa06969fa1c4b0012963d533d2fba130a769d/analysis/1425669652/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But Bright Cloud think its as malicious. Only TAC can verify this.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.brightcloud.com/tools/url-ip-lookup.php" title="http://www.brightcloud.com/tools/url-ip-lookup.php"&gt;URL/IP Lookup | Webroot BrightCloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2015 19:23:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-attack-false-positive-urussynonumsantonums-com/m-p/22261#M16224</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-03-06T19:23:04Z</dc:date>
    </item>
  </channel>
</rss>

