Talos has added and modified multiple rules in the browser-other, exploit-kit, file-office, file-pdf, indicator-compromise, malware-cnc, malware-other, os-linux, os-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46855 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46848 <-> DISABLED <-> INDICATOR-COMPROMISE Possible Samba internal DNS forged response (indicator-compromise.rules) * 1:46856 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46847 <-> DISABLED <-> OS-LINUX Red Hat NetworkManager DHCP client command injection attempt (os-linux.rules) * 1:46850 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM ForensicsAnalysisServlet authentication bypass attempt (server-webapp.rules) * 1:46857 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46842 <-> ENABLED <-> MALWARE-CNC GPON botnet outbound communication (malware-cnc.rules) * 1:46851 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46854 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46852 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46849 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46841 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46840 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46839 <-> DISABLED <-> MALWARE-CNC Win.Trojan.RedLeaves variant outbound connection (malware-cnc.rules) * 3:46843 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46844 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46845 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46846 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46858 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules) * 3:46859 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules)
* 1:25137 <-> ENABLED <-> EXPLOIT-KIT Styx exploit kit jar outbound connection (exploit-kit.rules) * 1:46495 <-> DISABLED <-> SERVER-OTHER HTTP request smuggling attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46851 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (snort3-server-webapp.rules) * 1:46841 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (snort3-malware-other.rules) * 1:46856 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (snort3-file-pdf.rules) * 1:46848 <-> DISABLED <-> INDICATOR-COMPROMISE Possible Samba internal DNS forged response (snort3-indicator-compromise.rules) * 1:46850 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM ForensicsAnalysisServlet authentication bypass attempt (snort3-server-webapp.rules) * 1:46855 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (snort3-browser-other.rules) * 1:46847 <-> DISABLED <-> OS-LINUX Red Hat NetworkManager DHCP client command injection attempt (snort3-os-linux.rules) * 1:46849 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (snort3-server-webapp.rules) * 1:46857 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (snort3-file-pdf.rules) * 1:46840 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (snort3-malware-other.rules) * 1:46839 <-> DISABLED <-> MALWARE-CNC Win.Trojan.RedLeaves variant outbound connection (snort3-malware-cnc.rules) * 1:46854 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (snort3-browser-other.rules) * 1:46842 <-> ENABLED <-> MALWARE-CNC GPON botnet outbound communication (snort3-malware-cnc.rules) * 1:46852 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (snort3-server-webapp.rules)
* 1:25137 <-> ENABLED <-> EXPLOIT-KIT Styx exploit kit jar outbound connection (snort3-exploit-kit.rules) * 1:46495 <-> DISABLED <-> SERVER-OTHER HTTP request smuggling attempt (snort3-server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091100.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46852 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46841 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46847 <-> DISABLED <-> OS-LINUX Red Hat NetworkManager DHCP client command injection attempt (os-linux.rules) * 1:46848 <-> DISABLED <-> INDICATOR-COMPROMISE Possible Samba internal DNS forged response (indicator-compromise.rules) * 1:46851 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46849 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46854 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46842 <-> ENABLED <-> MALWARE-CNC GPON botnet outbound communication (malware-cnc.rules) * 1:46850 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM ForensicsAnalysisServlet authentication bypass attempt (server-webapp.rules) * 1:46855 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46856 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46857 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46839 <-> DISABLED <-> MALWARE-CNC Win.Trojan.RedLeaves variant outbound connection (malware-cnc.rules) * 1:46840 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 3:46843 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46844 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46845 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46846 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46858 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules) * 3:46859 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules)
* 1:25137 <-> ENABLED <-> EXPLOIT-KIT Styx exploit kit jar outbound connection (exploit-kit.rules) * 1:46495 <-> DISABLED <-> SERVER-OTHER HTTP request smuggling attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46841 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46840 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46839 <-> DISABLED <-> MALWARE-CNC Win.Trojan.RedLeaves variant outbound connection (malware-cnc.rules) * 1:46857 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46856 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46855 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46854 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46852 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46851 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46850 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM ForensicsAnalysisServlet authentication bypass attempt (server-webapp.rules) * 1:46849 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46848 <-> DISABLED <-> INDICATOR-COMPROMISE Possible Samba internal DNS forged response (indicator-compromise.rules) * 1:46847 <-> DISABLED <-> OS-LINUX Red Hat NetworkManager DHCP client command injection attempt (os-linux.rules) * 1:46842 <-> ENABLED <-> MALWARE-CNC GPON botnet outbound communication (malware-cnc.rules) * 3:46843 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46844 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46845 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46846 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46858 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules) * 3:46859 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules)
* 1:25137 <-> ENABLED <-> EXPLOIT-KIT Styx exploit kit jar outbound connection (exploit-kit.rules) * 1:46495 <-> DISABLED <-> SERVER-OTHER HTTP request smuggling attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46852 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46854 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46857 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46840 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46847 <-> DISABLED <-> OS-LINUX Red Hat NetworkManager DHCP client command injection attempt (os-linux.rules) * 1:46848 <-> DISABLED <-> INDICATOR-COMPROMISE Possible Samba internal DNS forged response (indicator-compromise.rules) * 1:46849 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46842 <-> ENABLED <-> MALWARE-CNC GPON botnet outbound communication (malware-cnc.rules) * 1:46855 <-> DISABLED <-> BROWSER-OTHER Electron nodeIntegration bypass exploit attempt (browser-other.rules) * 1:46850 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM ForensicsAnalysisServlet authentication bypass attempt (server-webapp.rules) * 1:46856 <-> ENABLED <-> FILE-PDF ADOBE ActiveX Browser Plugin client side request injection attempt (file-pdf.rules) * 1:46841 <-> ENABLED <-> MALWARE-OTHER GPON exploit download attempt (malware-other.rules) * 1:46851 <-> DISABLED <-> SERVER-WEBAPP IBM QRadar SIEM command injection attempt (server-webapp.rules) * 1:46839 <-> DISABLED <-> MALWARE-CNC Win.Trojan.RedLeaves variant outbound connection (malware-cnc.rules) * 3:46843 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46844 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0599 attack attempt (file-office.rules) * 3:46845 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46846 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0600 attack attempt (file-office.rules) * 3:46858 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules) * 3:46859 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2018-0614 attack attempt (os-other.rules)
* 1:25137 <-> ENABLED <-> EXPLOIT-KIT Styx exploit kit jar outbound connection (exploit-kit.rules) * 1:46495 <-> DISABLED <-> SERVER-OTHER HTTP request smuggling attempt (server-other.rules)