<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cryptocurrency Mining? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193733#M58052</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The steps mentioned in that Reddit article are pretty good, and would be my immediate reaction. Honestly though you should really be looking at how someone was able to access your OAM server in the first place and mitigate that. Crypto mining isn't really a 'threat' per say, since they are just stealing your resources. However, if enough access to your server is actually allowed for this to happen then you could be leaving yourself open to bigger issues in the future.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Jan 2018 22:10:03 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-01-03T22:10:03Z</dc:date>
    <item>
      <title>Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193666#M58031</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We recently had a pen test and had positive results.&amp;nbsp; We do not use URL filtering, but have everything else.&lt;/P&gt;&lt;P&gt;However, on 12/24/2017 we can now see a reboot.txt file sitting in our Windows\temp directory on an Oracle OAM server.&lt;/P&gt;&lt;P&gt;Luckly, Carbon Black flagged the file as it was trying to be run and denied, running from cmd.exe.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can also see a new Windows task scheduler task created on 1/2/2017 that calls to run schtask1.ps1, that we did not create.&amp;nbsp; Also cannot find that file.&amp;nbsp; Did a restore of the VM to 12/21/2017, no trace of these new files and settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We continue to our threat alerts denying malicious traffic.&amp;nbsp; Quick searches so far seem to indicate cryptocurrency mining.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see there are a couple of PA references out there for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious if anyone has any comments as we continue our investigation or any of this rings a bell?&lt;/P&gt;&lt;P&gt;I've been searching our traffic logs for cryptocurreny as mentioned here, but nothing so far.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/6n2781/how_can_i_detect_bitcoin_traffic_pan_7011_and/" target="_blank"&gt;https://www.reddit.com/r/paloaltonetworks/comments/6n2781/how_can_i_detect_bitcoin_traffic_pan_7011_and/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 19:20:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193666#M58031</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-03T19:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193709#M58050</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Sorry for your troubles, never a good time. As a quick solution, you may want to try the following. While you wont get the bells and whistles without being a customer, it will block DNS qureies to their known bad sites:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.opendns.com/setupguide/" target="_blank"&gt;https://www.opendns.com/setupguide/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also take a look at&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-DNS-Sinkhole/ta-p/58891" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-DNS-Sinkhole/ta-p/58891&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 20:20:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193709#M58050</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-03T20:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193733#M58052</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The steps mentioned in that Reddit article are pretty good, and would be my immediate reaction. Honestly though you should really be looking at how someone was able to access your OAM server in the first place and mitigate that. Crypto mining isn't really a 'threat' per say, since they are just stealing your resources. However, if enough access to your server is actually allowed for this to happen then you could be leaving yourself open to bigger issues in the future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:10:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193733#M58052</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-03T22:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193741#M58054</link>
      <description>&lt;P&gt;Thank you for the feedback folks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BPry&lt;/P&gt;&lt;P&gt;Yes, I we are wondering how access was gained.&amp;nbsp; This is a server behind our PA with an internal IP, behind a load balancer with an internal IP.&amp;nbsp; We do NAT of course from a public IP to the load balancer private IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do see that there are several Weblogic patches for vulnerabilities, and we are likely out of date.&amp;nbsp; But trying to figure out how access was gained in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still investigating...&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:15:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193741#M58054</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-03T22:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193755#M58056</link>
      <description>&lt;P&gt;BPry&lt;/P&gt;&lt;P&gt;Otakar.Klier&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see there are wildfire traffic and threat detection&amp;nbsp;coming from this server in question.&amp;nbsp; The rule is an outbound to internet rule.&lt;/P&gt;&lt;P&gt;Would this mean that this server is in fact infected some how?&lt;/P&gt;&lt;P&gt;Since it is using wildfire, would that mean unknown or zero day perhaps?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threat2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13122i86D0099CF280B5E6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threat2.jpg" alt="threat2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also see this server attempting to reach out to the internet and session ends in threat.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threat.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13121i0C579AFA70D432B1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threat.jpg" alt="threat.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:49:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193755#M58056</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-03T22:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193756#M58057</link>
      <description>&lt;P&gt;I would say that its a safe bet the system&amp;nbsp;is&amp;nbsp;compromised. I would not hestitate to implement your incident response plan if you have one.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:51:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193756#M58057</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-03T22:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193757#M58058</link>
      <description>&lt;P&gt;Thank you Otakar.Klier&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would you know if the reset-both action means that the traffic is denied or dropped?&lt;/P&gt;&lt;P&gt;I mean that's what the PA is doing here, right?&lt;/P&gt;&lt;P&gt;Detecting the attempts of outgoing traffic as malcious?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:54:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193757#M58058</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-03T22:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193758#M58059</link>
      <description>&lt;P&gt;You are correct. PAN see's malicious traffic and is blocking it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are several types of actions the PAN can take.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;a silent drop is useful if obscurity is preferred.&lt;/LI&gt;&lt;LI&gt;reset-client is useful when user experience is key, the application will immediately be able to let the user know a connection is not available.&lt;/LI&gt;&lt;LI&gt;reset-server is useful when internal resources need to be protected from excessive resource consumption due to half-open sockets.&lt;/LI&gt;&lt;LI&gt;reset-both will provide best user experience and protect servers' resources, but may facilitate malicious use.&lt;/LI&gt;&lt;LI&gt;zone protection will add protective mechanisms that allow a more userfriendly experience while still protecting against abuse.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;A reset both just means that the PAN sent a close socket to both the attacker and victim in this case to prevent a DoS scenario.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 22:59:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193758#M58059</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-03T22:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193759#M58060</link>
      <description>&lt;P&gt;Here is some info on those IP's:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/en/ip-address/165.227.215.25/information/" target="_blank"&gt;https://www.virustotal.com/en/ip-address/165.227.215.25/information/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/en/ip-address/72.11.140.178/information/" target="_blank"&gt;https://www.virustotal.com/en/ip-address/72.11.140.178/information/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would say it depends on what you are looking for as your next steps. Some like to let the traffic continue and try and analyze to see if they can figure out where it can from. Others just want to shut it down ASAP, meaning put in policies to deny traffic to/from those IP's and any others that are not legit.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 23:04:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193759#M58060</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-03T23:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193760#M58061</link>
      <description>&lt;P&gt;Thanks again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess the trick is to know which are legit or not, and block them automatically if not legit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have not made any changes to remediate yet, since Carbon Black seems to be preventing it to run and PA is blocking traffic.&amp;nbsp; But don't know how it got there in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a call with a security provider tomorrow morning...will update.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 23:13:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193760#M58061</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-03T23:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193761#M58062</link>
      <description>&lt;P&gt;Best of luck. Also CB isnt catching everything since something is running and attempting to make those call outs. If you have a next gen AV package, it might be worth a shot to install it. If you dont I like to use Immunet. Its free, cloud based, and backed by some good intel.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2018 23:25:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/193761#M58062</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-03T23:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194291#M58151</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580" target="_self"&gt;&lt;FONT color="#333333"&gt;Otakar.Klier&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thank you guys for the responses.&lt;/P&gt;&lt;P&gt;Even though I feel this demonstrates that I am still learning and need to focus more time in reviewing our profiles, wanted to post this update for record, and others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After reviewing with terrific PA support, I believe the issue started with the fact that our Vulnerability profile was set to default (long before I got here).&amp;nbsp; Therefore, the threat in question was processed as its default action, alert (instead of reset both).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threat39277.jpg" style="width: 745px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13173i9DFE58D5DA0E1E18/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threat39277.jpg" alt="threat39277.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threataction.jpg" style="width: 796px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13174i46C919688C965B13/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threataction.jpg" alt="threataction.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems that the traffic was able to pass and then the server in question is an Oracle Weblogic server that was not patched to resolve this exploit!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since we had Carbon Black in place, the threat was unable to run.&amp;nbsp;&amp;nbsp;One of the behaviors was a powershell script would try to run scheduled or periodically and we blocked powershell to run and monitored its attempts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We corrected our vulnerability profile, restored the Oracle server from backup (previous to exploit) and so far we have no other powershell execution attempts and see that the threat is now identified and blocked at the firewall (reset both).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:17:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194291#M58151</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-08T16:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194306#M58152</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398"&gt;@OMatlock&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580" target="_self"&gt;&lt;FONT color="#333333"&gt;Otakar.Klier&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thank you guys for the responses.&lt;/P&gt;&lt;P&gt;Even though I feel this demonstrates that I am still learning and need to focus more time in reviewing our profiles, wanted to post this update for record, and others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After reviewing with terrific PA support, I believe the issue started with the fact that our Vulnerability profile was set to default (long before I got here).&amp;nbsp; Therefore, the threat in question was processed as its default action, alert (instead of reset both).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threat39277.jpg" style="width: 745px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13173i9DFE58D5DA0E1E18/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threat39277.jpg" alt="threat39277.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="threataction.jpg" style="width: 796px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13174i46C919688C965B13/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="threataction.jpg" alt="threataction.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems that the traffic was able to pass and then the server in question is an Oracle Weblogic server that was not patched to resolve this exploit!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since we had Carbon Black in place, the threat was unable to run.&amp;nbsp;&amp;nbsp;One of the behaviors was a powershell script would try to run scheduled or periodically and we blocked powershell to run and monitored its attempts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We corrected our vulnerability profile, restored the Oracle server from backup (previous to exploit) and so far we have no other powershell execution attempts and see that the threat is now identified and blocked at the firewall (reset both).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think this highlights an important fact...It's not necessarily always best to accept a "standard config."&amp;nbsp; At my company I went ahead an made the decision to override the defaults of all "Critical and High" signatures&amp;nbsp;to a "reset."&amp;nbsp; Just for this very reason.&amp;nbsp; I'd rather respond to "why is something being blocked" versus "how did we get compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your scenario does highlight a positive though...Defense-in-Depth.&amp;nbsp; While one source of protection may not be sufficient, either from misconfiguration or a straight failure, others should always be in-place to catch what might be missed.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 18:27:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194306#M58152</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-08T18:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194313#M58158</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;mentioned I highly recommend overriding severity Critical and High threats to simply reset the connection.&amp;nbsp; In some cases I've even assigned medium severity to reset-both as well. In my experiance it hasn't caused a&amp;nbsp;&lt;EM&gt;lot&lt;/EM&gt; of issues; and even when it has it's an easy discussion to have. "Hey I can't do this thing" is pretty easy to explain away; "Hey my computer/server is doing this thing" is a lot harder of a conversation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 18:46:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194313#M58158</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-08T18:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194339#M58162</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have to agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;, its time to maybe review your settings. Personally I have anything medium and higher set to block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 23:15:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194339#M58162</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-08T23:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194880#M58268</link>
      <description>&lt;P&gt;My last comment about this.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I believe this article is a good summary of what happened to us.&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica.com/information-technology/2018/01/hackers-turn-weblogic-peoplesoft-servers-into-cryptocoin-miners/" target="_blank"&gt;https://arstechnica.com/information-technology/2018/01/hackers-turn-weblogic-peoplesoft-servers-into-cryptocoin-miners/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Exploited our flawed vulnerability profile, unpatched Oracle Weblogic server to use for Cryptomining.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did find the&amp;nbsp;&lt;SPAN&gt;xmrig executable on our server, so feel pretty sure that was for mining.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Even though my last post does not mention, we did also patch our Oracle Weblogic server and have resolved this problem at firewall and server.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 22:49:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194880#M58268</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-01-11T22:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cryptocurrency Mining?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194882#M58269</link>
      <description>&lt;P&gt;Bummer dude, it always sucks. But at least you caught it and stopped it.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 23:06:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cryptocurrency-mining/m-p/194882#M58269</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-11T23:06:21Z</dc:date>
    </item>
  </channel>
</rss>

