<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Executable File Download from Root Directory on isc2-org2.meets.cirqlive[dot]com in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77111#M1487</link>
    <description>&lt;P&gt;Interesting and scary.&amp;nbsp; One of the recent posts had a LinkedIn url.&amp;nbsp; My work computer lit up like a Christmas tree.&amp;nbsp; It did not have a lot of detail but definitely blocked it from my.&amp;nbsp; I then verified that could still get to LinkedIn in case was a very recent change.&amp;nbsp; No issue there.&amp;nbsp; Concerning but not enough detail to say why it blocked it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Feb 2025 19:13:58 GMT</pubDate>
    <dc:creator>nkeaton</dc:creator>
    <dc:date>2025-02-14T19:13:58Z</dc:date>
    <item>
      <title>Executable File Download from Root Directory on isc2-org2.meets.cirqlive[dot]com</title>
      <link>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77109#M1486</link>
      <description>&lt;P data-unlink="true"&gt;Good morning!&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;While browsing one of the ISC2 websites&amp;nbsp;https://my.isc2[dot]org/ or&amp;nbsp;https://learn.isc2[dot]org/ from&amp;nbsp;my work computer, one for our security detection systems alerted us to the following:&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;-----------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;On February 14, 2025, at 5:11:16 PM UTC, an internal network source IP "XXX.XXX.XXX.XXX" attempted to download an executable file named "lti.exe" from the domain "isc2-org2.meets.cirqlive[dot]com" via the URL "hxxps://isc2-org2.meets.cirqlive[dot]com/lti.exe". The destination IP for this transfer was "172.104.22.159", located in Cedar Knolls, New Jersey, United States.&lt;BR /&gt;&lt;BR /&gt;## ANALYSIS:&lt;BR /&gt;__________________________________________&lt;BR /&gt;The investigation revealed an attempt to download an executable file ("lti.exe") from the root directory of the domain "isc2-org2.meets.cirqlive[dot]com" using an internal IP address "XXX.XXX.XXX.XXX". This download was permitted through the network firewall and categorized under the "XXXXXX Custom Category". The use of the POST method for this download can sometimes be indicative of attempts to camouflage malicious activity within legitimate traffic.&lt;BR /&gt;&lt;BR /&gt;Despite an extensive search for threat intelligence on the involved artifacts, including the domain, IP addresses, and specific URL, no malicious activity was detected. The domain "isc2-org2.meets.cirqlive[dot]com" was classified as neutral, with no history of malware or infections, and is associated with legitimate sectors like education and information technology. The source IP "XXX.XXX.XXX.XXX" also showed no signs of malicious activity or abuse reports. Additionally, there were no historical incidents or artifacts linking the file "lti.exe" to any known malicious activities.&lt;BR /&gt;&lt;BR /&gt;## RECOMMENDATION:&lt;BR /&gt;__________________________________________&lt;BR /&gt;- Verify the legitimacy of the "lti.exe" file at "hxxps://isc2-org2.meets.cirqlive[dot]com/lti.exe" to determine if the download was expected and authorized.&lt;BR /&gt;- If the download is found to be unauthorized or suspicious, block the domain "isc2-org2.meets.cirqlive[dot]com" to prevent any potential malicious activities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is going on ISC2?!&amp;nbsp; &amp;nbsp;This is substandard for a security vendor.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VR,&lt;/P&gt;&lt;P&gt;Micah&amp;nbsp;&lt;/P&gt;&lt;P&gt;CISSP #431532&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 17:53:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77109#M1486</guid>
      <dc:creator>mlloyd99577</dc:creator>
      <dc:date>2025-02-14T17:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Executable File Download from Root Directory on isc2-org2.meets.cirqlive[dot]com</title>
      <link>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77111#M1487</link>
      <description>&lt;P&gt;Interesting and scary.&amp;nbsp; One of the recent posts had a LinkedIn url.&amp;nbsp; My work computer lit up like a Christmas tree.&amp;nbsp; It did not have a lot of detail but definitely blocked it from my.&amp;nbsp; I then verified that could still get to LinkedIn in case was a very recent change.&amp;nbsp; No issue there.&amp;nbsp; Concerning but not enough detail to say why it blocked it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 19:13:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77111#M1487</guid>
      <dc:creator>nkeaton</dc:creator>
      <dc:date>2025-02-14T19:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Executable File Download from Root Directory on isc2-org2.meets.cirqlive[dot]com</title>
      <link>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77114#M1488</link>
      <description>&lt;P&gt;Micah,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for sharing, but have you reported to ISC2 management.&amp;nbsp; They are best suited to review and comment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am tagging&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/720618667"&gt;@mariatirado&lt;/a&gt;&amp;nbsp;such that she can circulate to the right folk internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 23:05:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Executable-File-Download-from-Root-Directory-on-isc2-org2-meets/m-p/77114#M1488</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2025-02-14T23:05:31Z</dc:date>
    </item>
  </channel>
</rss>

