<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Malicious traffic analysis in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-traffic-analysis/m-p/144170#M22418</link>
    <description>&lt;P&gt;We are experiencing an interesting phenomenon at our client&lt;/P&gt;&lt;P&gt;In several cases, we find that suspicious traffic leaves their internal server.&lt;/P&gt;&lt;P&gt;Unfortunately it is not clear whether this is a response traffic that is only an event displayed by smartlog or a real malicious traffic.&lt;/P&gt;&lt;P&gt;Please see the attached screenshots – sensitive data was masked.&lt;/P&gt;&lt;P&gt;Have you ever encountered something similar? Are we really dealing with malicious traffic?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen1-b.png" style="width: 993px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15776iDE59B19E2B0E5ECA/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen1-b.png" alt="screen1-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen3-b.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15774i45FF3351522867AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen3-b.png" alt="screen3-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen4-b.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15775i3D6D3A30792A9A24/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen4-b.png" alt="screen4-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Mar 2022 14:29:59 GMT</pubDate>
    <dc:creator>zsszlama</dc:creator>
    <dc:date>2022-03-18T14:29:59Z</dc:date>
    <item>
      <title>Malicious traffic analysis</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-traffic-analysis/m-p/144170#M22418</link>
      <description>&lt;P&gt;We are experiencing an interesting phenomenon at our client&lt;/P&gt;&lt;P&gt;In several cases, we find that suspicious traffic leaves their internal server.&lt;/P&gt;&lt;P&gt;Unfortunately it is not clear whether this is a response traffic that is only an event displayed by smartlog or a real malicious traffic.&lt;/P&gt;&lt;P&gt;Please see the attached screenshots – sensitive data was masked.&lt;/P&gt;&lt;P&gt;Have you ever encountered something similar? Are we really dealing with malicious traffic?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen1-b.png" style="width: 993px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15776iDE59B19E2B0E5ECA/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen1-b.png" alt="screen1-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen3-b.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15774i45FF3351522867AA/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen3-b.png" alt="screen3-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="screen4-b.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15775i3D6D3A30792A9A24/image-size/large?v=v2&amp;amp;px=999" role="button" title="screen4-b.png" alt="screen4-b.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 14:29:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-traffic-analysis/m-p/144170#M22418</guid>
      <dc:creator>zsszlama</dc:creator>
      <dc:date>2022-03-18T14:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious traffic analysis</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-traffic-analysis/m-p/144174#M22420</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;On the second log card i can see service:443 dst:your IP. So i assume 194.26.74.188 is trying to connect to your ip address on port 443. On the first log when 196.26.74.188 is using source port 443 and destination port some random high tcp port, it means the same to me. As i understan, reply packet from your ip address is being dropped by your IOC feed, which is correc because AFAIK onle outgoing traffic can be blocked by this feature. HTH.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 15:34:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-traffic-analysis/m-p/144174#M22420</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-03-18T15:34:22Z</dc:date>
    </item>
  </channel>
</rss>

