Potential False Positive IoC

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Potential False Positive IoC

L0 Member

Hello everyone! I'm Arsen, Junior SOC Analyst and I've got some questions regarding the detection Evasive HTTP C2 Traffic Detection(89950). Recently, I have received several alerts, where the Destination IP was 91.108.56.132, which is related to AS 62014 (T. Messenger Inc). The user claimed that he used a T. Desktop Application and it seems to be a normal practice in our company, so I don't understand why Palo Alto triggers on this IP.

1 REPLY 1

Community Team Member

Hi @A.Tsadzikidze ,

 

Threat ID 89950 is an Anti-Spyware detection and appears to be based on behavioral analysis rather than just the destination IP itself. In other words, Palo Alto may be flagging the HTTP traffic pattern as C2-like, even if the destination belongs to Telegram.

 

Since you confirmed the user’s activity aligns with expected Telegram Desktop usage, it might be worh it to open a TAC case and including the threat logs and a packet capture so it can be reviewed properly.

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1203 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!