ive seen DPI screw up perfectly clean SMTP traffic because it thought an image in the footer (that had been in there for over a year) was now malicious due to signature matching - giant pain in the you know where because the rule was set to silently drop (which is ultra stupid in a commercial environment)
It was reported in the ubiquity thread I linked. In looking into it further it seems to me that blizz might be initiating a connection remotely to āpushā certain data, triggered from your active connection. If Iām not mistaken, that is bad practice and not too shocking it matches a malicious signature ā just like any RAT or reverse shell. Iām not too sure what Ubiquity or other vendors could do other than exclude the wow protocol. It also seems like blizz is aware of the problem, but is blaming firewalls generally ("transfer aborted: instance not foundā in Shadowlands - #4 by IllƬdĆ n-barthilas)
Finally caught it. The exact same moment I dcādā¦
Threat Management Alert 1: A Network Trojan was Detected. Signature ET TROJAN Netwire RAT Check-in. From: 35.232.127.122:3724, to: 10.0.1.152:58003, protocol: TCP
although this is a google cloud IP I assume itās being used by blizzard since itās the same exact log you have at the same exact time I DCād. Also .152 is the computer I play onā¦ so it all lines up!
Thanks for the update Knoest, glad to see that you and Solania were able to figure out what was triggering the connection issue. Hopefully since this has been reported to Ubiquity they may be able to make some adjustments to DPI threat detection to prevent this in the future. Ubiquity devices definitely arenāt your run-of-the-mill home routers, so I could see how not very many people would be affected by this or notice it at all since the vast majority of WoW players wouldnāt be running that type of equipment.
You are correct! With the launch of Shadowlands WoW is now leveraging GCP (Google Cloud Platform) to host world/instance servers as needed, so it is expected to see some Google IPs show up. Port 3724 is the main WoW port.
That thread is actually for a different problem entirely and not related to what is being discussed in this thread. We know that firewalls can sometimes cause problems, but itās definitely not something we would jump to without doing some basic troubleshooting/investigation first.
I was directed to this thread from a post I made about what appears to be an identical issue. Did you folks find relief from whitelisting some IP addresses or did you have to disable IPS altogether? Iām on a UDMP, and Iām seeing a few different IP addresses with the same port, which appears to be Blizzard. I feel like I need a list of IPs to whitelist for it to make a difference, absent disabling IPS altogether.
Oh my god thank you thank you thank. I was about to throw my PC out my window. And given the shortage of GPUs these days, I may have stopped playing WoW completely. But I have Ubiquiti gear, and I have IPS enabled, and I am SUPER HOPEFUL you guys are onto the problem. I just checked my IPS logs and found:
04/12/2021 3:32 pm Malware ET MALWARE Netwire RAT Check-in 34.123.149.90 : 3724 192.168.2.55 : 51799
This is the exact time that my dungeon āfrozeāā¦ all graphics working fine, able to chat with team, but no one else is moving.
I WILL REPORT BACK!
Damnā¦ look at the log from yesterday. I was actually RAGING with the āfreezesā
I am having a similar issue where the game freezes, but running on the spot happens. I donāt have the same hardware as the above players, is there a fix for those of us without Ubiquiti hardware?
Posted this in another related thread but copying here as well:
Apologies for somewhat necro-bumping this, but Iāve run into the same issue recently. After getting partial DCād like this several times during M+ runs, Iāve gone and aggressively whitelisted most of the subnets in Blizzard ASN (AS57976). The following subnets are what Iāve whitelisted:
24.105.0.0/18 (US)
37.244.0.0/18 (EU/US)
59.153.40.0/22 (JP)
103.198.32.0/23 (AU)
137.221.64.0/18 (EU)
158.115.192.0/19 (US)
185.60.112.0/22 (EU)
198.74.32.0/21 (US)
Blizzard is also leveraging GCP (Google Cloud Platform) now with Shadowlands, so thereās some non-Blizzard IPs that have been tripping this as well (search logs for port 3724 on one end). I didnāt want to disable all IPS for everything on GCP, but without knowing what allocation Blizzard has there, itās hard to cover everything.
As a compromise, I added a signature suppression for āET MALWARE Netwire RAT Check-inā and āET MALWARE Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 103ā (the two signatures I have flagged in my logs) for 34.64.0.0/10. N.B. this is a rather large IP range, covering 34.64.0.0 - 34.127.255.255. These are all GCP IP addresses, but Blizzard does not control whatās on the vast majority of this IP space. I determined this to be an acceptable risk. Most of the subnets are part of AS15169 (GOOGL-2 / Google LLC), but some are in AS139070 (GOOGLE-CLOUD / Google Asia Pacific Pte. Ltd.). There are also many other networks in AS15169, but until I see any Blizzard traffic from them, Iām opting not to add them.