Talos Rules 2024-08-20
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-plugins, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:26:44 UTC

Snort Subscriber Rules Update

Date: 2024-08-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63895 <-> ENABLED <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt (server-webapp.rules)
 * 1:63896 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63898 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63893 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63894 <-> DISABLED <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt (server-webapp.rules)
 * 1:63899 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63897 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt (malware-other.rules)
 * 1:63900 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63902 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 1:63901 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection (malware-cnc.rules)
 * 3:63906 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63907 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63905 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63908 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63903 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63909 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)
 * 3:63904 <-> ENABLED <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt (server-webapp.rules)

Modified Rules:


 * 1:31409 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31407 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31408 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)
 * 1:31410 <-> DISABLED <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt (browser-plugins.rules)

2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:30:59 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt


2024-08-20 14:31:00 UTC

Snort Subscriber Rules Update

Date: 2024-08-19-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300990 <-> SERVER-WEBAPP Apache OFBiz Java expression language injection attempt
* 1:300991 <-> MALWARE-OTHER Win.Ransomware.HexaLocker variant download attempt
* 1:63895 <-> SERVER-WEBAPP Apache OFBiz directory traversal attempt
* 1:63898 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63899 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63900 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63901 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 1:63902 <-> MALWARE-CNC Win.Ransomware.HexaLocker outbound connection
* 3:63903 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63904 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63905 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63906 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63907 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63908 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt
* 3:63909 <-> SERVER-WEBAPP Cisco SPA Series IP Phones buffer overflow attempt

Modified Rules:

* 1:31407 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31408 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31409 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt
* 1:31410 <-> BROWSER-PLUGINS Adobe Reader 11 messageHandler ActiveX access attempt