On 06/07/2016 09:56, Daniel Karrenberg wrote: It is indeed a FP. There was a collision between variant of Tinba DGA and legit domain - thinksquare.net. As you can see it the below link, a lot of malwares samples communicated with thinksquare.net on the exact same day. https://www.virustotal.com/en/domain/thinksquare.net/information/ -Hank
I am positive tinba cannot run on the probes.
So either that IDS is brain damaged or some joker made a UDM that acts like tinba or both. What Marc said: the 'CnC' appears to be at the root name servers. Queue conspiracy theory .....
Daniel
On 5.07.16 14:15 , Hank Nussbacher wrote:
I received a report from one of our security monitoring systems about one of our probes (#17846) - https://atlas.ripe.net/probes/17846/ which appears to be infected with Tinba:
Security incident #1 - Tinba infection Involved internal Hosts: atlas-probe.cc.biu.ac.il 132.70.248.150 spotted since 2016-06-30 23:58:54 till 2016-07-01 05:01:20 Malicious activities found: Tinba infection related indication of compromise: Communication with CnC 192.112.36.4 192.203.230.10 192.228.79.201 192.33.4.12 192.36.148.17 193.0.14.129 198.41.0.4 198.97.190.53 199.7.83.42 199.7.91.13 202.12.27.33
Should we be worried?
Thanks,
Hank