Additional Post Contributors: Mindy Schlueter
On June 11, the Cisco Live San Diego SOC received a Cisco XDR Incident triggered by two Cisco Secure Firewall events.
Both pointed to a Zeek detection:SNIFFPASS::HTTP_POST_Password_Seen. This is a clear sign that credentials were transmitted in unencrypted HTTP traffic.
This detection is a red flag: Usernames and passwords are being sent in plaintext, making them easy targets for anyone monitoring the network. This kind of risky behavior is often caused by:
The core issue: A publicly available mobile app (on both Android and iOS) uses unencrypted HTTP to transmit credentials. While the traffic wasn't outright malicious, it posed a serious privacy risk.
Rather than block the traffic, the SOC opted to educate the users on the dangers of using insecure apps - reinforcing the importance of encrypted communications.
Want to learn more about what we saw at Cisco Live San Diego 2025? check out our main blog post - Cisco Live San Diego 2025 SOC - and the rest of our Cisco Live SOC content.
We'd love to hear what you think! Ask a question and stay connected with Cisco Security on social media.
Cisco Security Social Media
LinkedIn
Facebook
Instagram
X