Threat Report: Exposing Malware in Linux-Based Multi-Cloud Environments | Download Now Feed Has Been Updated! Feed Has Been Updated!

Hello All!

We are pleased to announce that the feed has been updated to provide broader and deeper coverage!

Product(s) Affected

  • Cb Response

Deployment Date

  • Thursday, 3/9/17

New Feed Coverage

  • Ransomware Tracker New!
  • Feodo Tracker New!
  • SSL Blacklist New!
  • Zbot/ZeuS Tracker (Existing)

Required Customer Action(s)

  • This will be a transparent update to the feed; if you have already enabled the feed there is no additional work needed. 


  • We will apply these new capabilities retroactively (as well as in real time) so we will alert on previous activities that match the current indicators of malicious activity.

If you have any questions, please let us know!

Paul Riegle

Director, Product Management


How to check if the Feed is enabled

Yay! Thank you.

Which Carbon Black product is this for?


Phylis Herrin

Application Administrator II

Cahaba Information Security

Phone: 205 220-1446


Hi Phylis,

This is for the Cb Response product - I've updated the announcement.




Since the Abusech updates came out, we have been seeing alerts for traffic to the IP  We are treating these as legitimate hits, but I am wondering if anyone else is running into it or has seen it?  It is the ZeuS IP Blocklist from Abusech that is flagging it, which is concerning.  Just wondering if anyone else is seeing it.  Thanks.

Paul K.

I'm seeing the same thing for the IP In looking it up in domain tools it appears that 2,510,954 websites use the address.

Domain Tools

We are currently seeing a decent number of hits, and investigating.

That IP is definitely bad...

Will share if I learn more.

This is not uncommon with IP based indicators, and is one of the reasons we spend more time investing in query based feeds that identify patterns of attack rather than static indicators. Sites that use shared hosting end up using the same IP addresses, and this IP is used by many, many sites (as mentioend by compl3tesle3t). I can confirm that there are sites hosted on that IP that are indeed owned/malicious (for example www[.]lafyeri[.]com), but obviously many/most of those sites hosted here are not compromised.  Best bet is to look at the host in question, confirm that you are okay with the netconns you’re seeing within CbR, and then mark as a false positive.

As an update to my previous comments - our hits to this IP are actually the result of a DNS suffix misconfiguration.

Fixing this issue - we can rule out 99% of this.

Hope this helps others.

Yes we got a hit on that one.  I could not see anything strange associated with it.

We have been seeing a lot of hits on this IP over the past week.  We have found it associated to many different sites, but at this point have not seen any malicious activity on our network. 

thank you for sharing the information .

This is a great addition, however we're observing a large number of false positives on the IP based indicators due to shared hosting. 

Is there a way to keep IP data but only alert on Domains and Hash hits as they're higher fidelity?  I don't want to lose the IP based data for enriching the logs...

It looks like there are only two options:

  1. Ignore the IP data feeds and continue alerting
  2. Turn off all alerting and only enrich data

I have seen more reports on but when I look at the events no such IP is found. Anyone else seeing this?

This is generating an alert everyday for binaries that were alerted from other threat feeds back in Nov 2018 and Jan 2019.  Please check to see if the feed is operating nominally.



Article Information
Creation Date: