{"id":93689,"date":"2023-07-12T17:51:22","date_gmt":"2023-07-12T21:51:22","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=93689"},"modified":"2023-08-03T13:42:28","modified_gmt":"2023-08-03T17:42:28","slug":"july-2023-iocs","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/july-2023-iocs","title":{"rendered":"July 2023 Incident Indicators of Compromise (IoCs)"},"content":{"rendered":"\n
<\/p><\/div>
Based on our investigation, we have identified the following malicious IP addresses and hashes to block and avoid at all costs. Please use this data to add additional protection to your Endpoint Detection and Response (EDR) and perimeter security solutions. This list may be updated periodically.<\/p>\n\n\n\n
Use the following list of IP addresses to inspect logs between June 20 and July 5 for any suspicious activity:<\/strong><\/p>\n\n\n\n <\/p><\/div> Threat actors do not re-use IP addresses, and many of them will be recycled. Continued blocking\/alerting on these can result in false positives or block legitimate traffic.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Block all of the following domains for ingress and egress<\/strong>:<\/p>\n\n\n\n Do NOT allow these hashes to be executed<\/strong>:<\/p>\n\n\n\n SHA256: 9151ff77b65eeacd5cdddd13c041db3ad9818fd2aebe05d8745227fac7e516b8 <\/p>\n\n\n\n SHA256: 4dc71b659c9277c7bb704392f8af5b6b2fbc9a66d3ad80d8cb4df0bd686f0e86 As a reminder, please do not reach out to these IPs or URLs directly from your company\u2019s infrastructure. Please use a tool such as VirusTotal when evaluating IoCs.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" Based on our investigation, we have identified the following malicious IP addresses and hashes to block and avoid at all […]<\/p>\n","protected":false},"author":206,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[],"support_tag":[],"coauthors":[2842],"acf":[],"yoast_head":"\n\n
\n
SHA1: 92480e506d51d920fcc1d4dba7206c3185317f61
MD5: 3a9c24c92c221658a8bf9ce61d758e1a<\/p>\n<\/div><\/div>\n\n\n\n
SHA1: cb0e71340f963f7f2f404a0431d82ac809d2b15d
MD5: b8724109e5473b4ca79a13c33b865e32<\/p>\n<\/div><\/div>\n\n\n\n