Screen Freeze kinda

ive seen DPI screw up perfectly clean SMTP traffic because it thought an image in the footer (that had been in there for over a year) was now malicious due to signature matching - giant pain in the you know where because the rule was set to silently drop (which is ultra stupid in a commercial environment)

can you report the false positive to the vendor?

It was reported in the ubiquity thread I linked. In looking into it further it seems to me that blizz might be initiating a connection remotely to ā€˜pushā€™ certain data, triggered from your active connection. If Iā€™m not mistaken, that is bad practice and not too shocking it matches a malicious signature ā€“ just like any RAT or reverse shell. Iā€™m not too sure what Ubiquity or other vendors could do other than exclude the wow protocol. It also seems like blizz is aware of the problem, but is blaming firewalls generally ("transfer aborted: instance not foundā€ in Shadowlands - #4 by IllƬdĆ n-barthilas)

Finally caught it. The exact same moment I dcā€™dā€¦

Threat Management Alert 1: A Network Trojan was Detected. Signature ET TROJAN Netwire RAT Check-in. From: 35.232.127.122:3724, to: 10.0.1.152:58003, protocol: TCP

although this is a google cloud IP I assume itā€™s being used by blizzard since itā€™s the same exact log you have at the same exact time I DCā€™d. Also .152 is the computer I play onā€¦ so it all lines up!

Hey again,

Thanks for the update Knoest, glad to see that you and Solania were able to figure out what was triggering the connection issue. Hopefully since this has been reported to Ubiquity they may be able to make some adjustments to DPI threat detection to prevent this in the future. Ubiquity devices definitely arenā€™t your run-of-the-mill home routers, so I could see how not very many people would be affected by this or notice it at all since the vast majority of WoW players wouldnā€™t be running that type of equipment.

You are correct! With the launch of Shadowlands WoW is now leveraging GCP (Google Cloud Platform) to host world/instance servers as needed, so it is expected to see some Google IPs show up. Port 3724 is the main WoW port.

That thread is actually for a different problem entirely and not related to what is being discussed in this thread. We know that firewalls can sometimes cause problems, but itā€™s definitely not something we would jump to without doing some basic troubleshooting/investigation first.

I am kinda wondering what it is yall are sending that appears to be a remote access tool thoughā€¦ kinda makes the brain wonder a bit and all ya know.

1 Like

I was directed to this thread from a post I made about what appears to be an identical issue. Did you folks find relief from whitelisting some IP addresses or did you have to disable IPS altogether? Iā€™m on a UDMP, and Iā€™m seeing a few different IP addresses with the same port, which appears to be Blizzard. I feel like I need a list of IPs to whitelist for it to make a difference, absent disabling IPS altogether.

Oh my god thank you thank you thank. I was about to throw my PC out my window. And given the shortage of GPUs these days, I may have stopped playing WoW completely. But I have Ubiquiti gear, and I have IPS enabled, and I am SUPER HOPEFUL you guys are onto the problem. I just checked my IPS logs and found:
04/12/2021 3:32 pm Malware ET MALWARE Netwire RAT Check-in 34.123.149.90 : 3724 192.168.2.55 : 51799
This is the exact time that my dungeon ā€œfrozeā€ā€¦ all graphics working fine, able to chat with team, but no one else is moving.
I WILL REPORT BACK!

Damnā€¦ look at the log from yesterday. I was actually RAGING with the ā€œfreezesā€

04/11/2021 8:42 pm Malware ET MALWARE Netwire RAT Check-in 35.226.216.87 : 3724 192.168.2.55 : 51513 SUPPRESS
04/11/2021 7:07 pm Malware ET MALWARE Netwire RAT Check-in 34.72.65.159 : 3724 192.168.2.55 : 64897 SUPPRESS
04/11/2021 6:58 pm Malware ET MALWARE Netwire RAT Check-in 34.72.65.159 : 3724 192.168.2.55 : 64680 SUPPRESS
04/11/2021 6:18 pm Malware ET MALWARE Netwire RAT Check-in 24.105.35.226 : 3724 192.168.2.55 : 62049 SUPPRESS
04/11/2021 4:28 pm Malware ET MALWARE Netwire RAT Check-in 24.105.36.37 : 3724 192.168.2.55 : 59282 SUPPRESS
04/11/2021 3:22 pm Malware ET MALWARE Netwire RAT Check-in 35.193.56.200 : 3724 192.168.2.55 : 56194 SUPPRESS
04/11/2021 12:36 pm Malware ET MALWARE Netwire RAT Check-in 24.105.33.158 : 3724 192.168.2.55 : 49898 SUPPRESS
04/11/2021 12:14 pm Malware ET MALWARE Netwire RAT Check-in 24.105.33.158 : 3724 192.168.2.55 : 49533

Problem is solved after suppressing this rule! Thank you so much.

2 Likes

Ah thatā€™s amazing! I just checked this thread and noticed you had a fix. Now I can dump my vpn and lower the ping a bit more! Thanks for the fix!

I am having a similar issue where the game freezes, but running on the spot happens. I donā€™t have the same hardware as the above players, is there a fix for those of us without Ubiquiti hardware?

Post a winmtr. We canā€™t diagnose without data.

Same problem here. TPLink Archer AX6000, started about 3 weeks ago. Happens in and out of dungeons, raids, open world.

Just reproduced it after 2 hours of play. MTR report below:

|------------------------------------------------------------------------------------------|
|                                      WinMTR statistics                                   |
|                       Host              -   %  | Sent | Recv | Best | Avrg | Wrst | Last |
|------------------------------------------------|------|------|------|------|------|------|
|                                TP-SHARE -    0 | 3073 | 3073 |    0 |    0 |   17 |    0 |
|                           24.105.62.129 -    0 | 3073 | 3073 |    1 |    4 |  206 |    3 |
|________________________________________________|______|______|______|______|______|______|
   WinMTR v0.92 GPL V2 by Appnor MSP - Fully Managed Hosting & Cloud Provider

As you can see, itā€™s fine.

I turned off the SPI firewall on the Router. Next step is disable Windows firewall.

I canā€™t imagine Verizon FIOS is doing this because if they were, the forums would be full of it.

Posted this in another related thread but copying here as well:

Apologies for somewhat necro-bumping this, but Iā€™ve run into the same issue recently. After getting partial DCā€™d like this several times during M+ runs, Iā€™ve gone and aggressively whitelisted most of the subnets in Blizzard ASN (AS57976). The following subnets are what Iā€™ve whitelisted:
24.105.0.0/18 (US)
37.244.0.0/18 (EU/US)
59.153.40.0/22 (JP)
103.198.32.0/23 (AU)
137.221.64.0/18 (EU)
158.115.192.0/19 (US)
185.60.112.0/22 (EU)
198.74.32.0/21 (US)

Blizzard is also leveraging GCP (Google Cloud Platform) now with Shadowlands, so thereā€™s some non-Blizzard IPs that have been tripping this as well (search logs for port 3724 on one end). I didnā€™t want to disable all IPS for everything on GCP, but without knowing what allocation Blizzard has there, itā€™s hard to cover everything.

As a compromise, I added a signature suppression for ā€œET MALWARE Netwire RAT Check-inā€ and ā€œET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 103ā€ (the two signatures I have flagged in my logs) for 34.64.0.0/10.
N.B. this is a rather large IP range, covering 34.64.0.0 - 34.127.255.255. These are all GCP IP addresses, but Blizzard does not control whatā€™s on the vast majority of this IP space. I determined this to be an acceptable risk. Most of the subnets are part of AS15169 (GOOGL-2 / Google LLC), but some are in AS139070 (GOOGLE-CLOUD / Google Asia Pacific Pte. Ltd.). There are also many other networks in AS15169, but until I see any Blizzard traffic from them, Iā€™m opting not to add them.

References
https://bgpview.io/asn/57976
https://bgpview.io/prefix/34.64.0.0/10

2 Likes