Hello everyone!
We have worked with our security team, Microsoft, and other customers who have seen similar log messages.
This log message is very misleading, as it appears to state that the malicious URI was detected within your network — this would be a major concern were it the case. However, as we’ve learned when working with those other customers, that URI is just an example of a malicious URI that has previously been associated with that IP. But it wasn’t observed within your network.
Apart from by checking with Microsoft, you can validate this because the data source for this (flow logs) operate only at layer3/4 and cannot actually contain URIs. We have also seen these alerts on connections blocked at the firewall (would never be able to request a URI) and also on encrypted connections (where the tool wouldn’t be able to see the URI).
The IP address in question is for github.io, so all that is actually occurring to trigger this is any connection to github.io. In practice, we have high confidence this is a call to nvidia.github.io that is issued on some Azure Databricks systems based on Nvidia drivers.
In summary: based on conversations with Microsoft and lengthy analysis across multiple customers, this is just a very misleading log message and not an indication of any infection.