Cisco's XDR platform detected suspicious P2P traffic from a rented notebook at Black Hat Europe 2025. The investigation used Firepower IDS, Corelight NDR, and JA3 fingerprinting to identify Syncthing file synchronization software communicating over port 22067 with multiple malicious IPs. The device, used for sales

7m read timeFrom blogs.cisco.com
Post cover image
Table of contents
Investigation StepsTakeaway and ResponseFinal ThoughtsAbout Black Hat

Sort: