Talos has added and modified multiple rules in the browser-other, file-image, file-office, file-other, file-pdf, indicator-compromise, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:47439 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47449 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47451 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47455 <-> DISABLED <-> POLICY-OTHER IntegraXor config change attempt (policy-other.rules) * 1:47450 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47452 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47437 <-> DISABLED <-> SERVER-WEBAPP Weblog Expert Web Server denial of service attempt (server-webapp.rules) * 1:47448 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47447 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47445 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47444 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47453 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47446 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47436 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID outbound connection (malware-cnc.rules) * 1:47440 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47441 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47438 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47434 <-> DISABLED <-> MALWARE-CNC Win.Coinminer.HiddenShock variant outbound connection (malware-cnc.rules) * 1:47435 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID payload download (malware-cnc.rules) * 1:47454 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 3:47432 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47428 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47430 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47442 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47433 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47443 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47456 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47457 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47431 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47429 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules)
* 1:43825 <-> DISABLED <-> MALWARE-CNC Osx.Trojan.XAgent outbound connection (malware-cnc.rules) * 1:46999 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47000 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47001 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47002 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:47435 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID payload download (malware-cnc.rules) * 1:47436 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID outbound connection (malware-cnc.rules) * 1:47438 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47453 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47448 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47434 <-> DISABLED <-> MALWARE-CNC Win.Coinminer.HiddenShock variant outbound connection (malware-cnc.rules) * 1:47452 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47447 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47439 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47451 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47454 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47455 <-> DISABLED <-> POLICY-OTHER IntegraXor config change attempt (policy-other.rules) * 1:47444 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47440 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47437 <-> DISABLED <-> SERVER-WEBAPP Weblog Expert Web Server denial of service attempt (server-webapp.rules) * 1:47445 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47446 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47449 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47441 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47450 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 3:47443 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47430 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47442 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47433 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47429 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47457 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47432 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47431 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47428 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47456 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules)
* 1:43825 <-> DISABLED <-> MALWARE-CNC Osx.Trojan.XAgent outbound connection (malware-cnc.rules) * 1:46999 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47000 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47001 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47002 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:47439 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (snort3-file-pdf.rules) * 1:47455 <-> DISABLED <-> POLICY-OTHER IntegraXor config change attempt (snort3-policy-other.rules) * 1:47454 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (snort3-malware-other.rules) * 1:47435 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID payload download (snort3-malware-cnc.rules) * 1:47438 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (snort3-file-pdf.rules) * 1:47445 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47446 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47436 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID outbound connection (snort3-malware-cnc.rules) * 1:47449 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47444 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47450 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47453 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (snort3-malware-other.rules) * 1:47448 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47434 <-> DISABLED <-> MALWARE-CNC Win.Coinminer.HiddenShock variant outbound connection (snort3-malware-cnc.rules) * 1:47451 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47441 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (snort3-file-other.rules) * 1:47447 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules) * 1:47437 <-> DISABLED <-> SERVER-WEBAPP Weblog Expert Web Server denial of service attempt (snort3-server-webapp.rules) * 1:47440 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (snort3-file-other.rules) * 1:47452 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (snort3-malware-cnc.rules)
* 1:43825 <-> DISABLED <-> MALWARE-CNC Osx.Trojan.XAgent outbound connection (snort3-malware-cnc.rules) * 1:46999 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (snort3-indicator-compromise.rules) * 1:47000 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (snort3-indicator-compromise.rules) * 1:47001 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (snort3-indicator-compromise.rules) * 1:47002 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (snort3-indicator-compromise.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091100.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:47437 <-> DISABLED <-> SERVER-WEBAPP Weblog Expert Web Server denial of service attempt (server-webapp.rules) * 1:47455 <-> DISABLED <-> POLICY-OTHER IntegraXor config change attempt (policy-other.rules) * 1:47434 <-> DISABLED <-> MALWARE-CNC Win.Coinminer.HiddenShock variant outbound connection (malware-cnc.rules) * 1:47450 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47445 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47449 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47451 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47444 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47435 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID payload download (malware-cnc.rules) * 1:47439 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47448 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47452 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47447 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47441 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47453 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47446 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47454 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47440 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47438 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47436 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID outbound connection (malware-cnc.rules) * 3:47428 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47456 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47430 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47433 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47432 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47429 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47457 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47443 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47442 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47431 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules)
* 1:43825 <-> DISABLED <-> MALWARE-CNC Osx.Trojan.XAgent outbound connection (malware-cnc.rules) * 1:46999 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47000 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47001 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47002 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:47445 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47444 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47441 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47440 <-> ENABLED <-> FILE-OTHER InPage reader remote code execution attemptt (file-other.rules) * 1:47439 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47438 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JBIG parsing out of bounds read attempt (file-pdf.rules) * 1:47437 <-> DISABLED <-> SERVER-WEBAPP Weblog Expert Web Server denial of service attempt (server-webapp.rules) * 1:47436 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID outbound connection (malware-cnc.rules) * 1:47435 <-> ENABLED <-> MALWARE-CNC Win.Dropper.IcedID payload download (malware-cnc.rules) * 1:47434 <-> DISABLED <-> MALWARE-CNC Win.Coinminer.HiddenShock variant outbound connection (malware-cnc.rules) * 1:47455 <-> DISABLED <-> POLICY-OTHER IntegraXor config change attempt (policy-other.rules) * 1:47454 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47453 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Gorgon attempted download (malware-other.rules) * 1:47452 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47451 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47450 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47449 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47448 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47447 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 1:47446 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Gorgon outbound connection (malware-cnc.rules) * 3:47428 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47429 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0645 attack attempt (file-image.rules) * 3:47430 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47431 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47432 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47433 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2018-0644 attack attempt (file-image.rules) * 3:47442 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47443 <-> ENABLED <-> BROWSER-OTHER TRUFFLEHUNTER TALOS-2018-0647 attack attempt (browser-other.rules) * 3:47456 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules) * 3:47457 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2018-0646 attack attempt (file-office.rules)
* 1:43825 <-> DISABLED <-> MALWARE-CNC Osx.Trojan.XAgent outbound connection (malware-cnc.rules) * 1:46999 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47000 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47001 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules) * 1:47002 <-> DISABLED <-> INDICATOR-COMPROMISE SettingContent-ms file type download attempt (indicator-compromise.rules)