Talos has added and modified multiple rules in the file-pdf, malware-backdoor, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46271 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46274 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46273 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46278 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46270 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46291 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor file management attempt (malware-backdoor.rules) * 1:46297 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46298 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46299 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46269 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46290 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor detected (malware-backdoor.rules) * 1:46272 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46268 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46279 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46280 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46300 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46289 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46281 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46282 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46283 <-> DISABLED <-> SERVER-WEBAPP Quest NetVault Backup Server NVBUJobCountHistory SQL injection attempt (server-webapp.rules) * 1:46284 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios user agent outbound communication attempt (malware-cnc.rules) * 1:46285 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46275 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46286 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46276 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46287 <-> DISABLED <-> SERVER-WEBAPP Linksys E series denial of service attempt (server-webapp.rules) * 1:46277 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46288 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 3:46294 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46295 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46296 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0570 attack attempt (server-webapp.rules) * 3:46293 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules) * 3:46292 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46288 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46283 <-> DISABLED <-> SERVER-WEBAPP Quest NetVault Backup Server NVBUJobCountHistory SQL injection attempt (server-webapp.rules) * 1:46287 <-> DISABLED <-> SERVER-WEBAPP Linksys E series denial of service attempt (server-webapp.rules) * 1:46276 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46277 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46300 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46286 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46290 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor detected (malware-backdoor.rules) * 1:46289 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46278 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46279 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46280 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46281 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46298 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46297 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46271 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46273 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46284 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios user agent outbound communication attempt (malware-cnc.rules) * 1:46282 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46272 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46274 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46269 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46275 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46291 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor file management attempt (malware-backdoor.rules) * 1:46285 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46299 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46268 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46270 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 3:46293 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules) * 3:46295 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46296 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0570 attack attempt (server-webapp.rules) * 3:46294 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46292 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46298 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (snort3-server-webapp.rules) * 1:46271 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (snort3-malware-cnc.rules) * 1:46270 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (snort3-malware-cnc.rules) * 1:46288 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (snort3-malware-backdoor.rules) * 1:46275 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46300 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (snort3-server-webapp.rules) * 1:46274 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46299 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (snort3-server-webapp.rules) * 1:46268 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (snort3-malware-cnc.rules) * 1:46278 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46279 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46280 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46276 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46281 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46269 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (snort3-malware-cnc.rules) * 1:46277 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46272 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (snort3-malware-cnc.rules) * 1:46297 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (snort3-server-webapp.rules) * 1:46290 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor detected (snort3-malware-backdoor.rules) * 1:46291 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor file management attempt (snort3-malware-backdoor.rules) * 1:46289 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (snort3-malware-backdoor.rules) * 1:46273 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules) * 1:46287 <-> DISABLED <-> SERVER-WEBAPP Linksys E series denial of service attempt (snort3-server-webapp.rules) * 1:46285 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (snort3-malware-cnc.rules) * 1:46286 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (snort3-malware-cnc.rules) * 1:46283 <-> DISABLED <-> SERVER-WEBAPP Quest NetVault Backup Server NVBUJobCountHistory SQL injection attempt (snort3-server-webapp.rules) * 1:46284 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios user agent outbound communication attempt (snort3-malware-cnc.rules) * 1:46282 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (snort3-server-samba.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091100.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46289 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46290 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor detected (malware-backdoor.rules) * 1:46270 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46278 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46273 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46268 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46297 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46291 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor file management attempt (malware-backdoor.rules) * 1:46277 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46279 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46280 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46281 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46282 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46283 <-> DISABLED <-> SERVER-WEBAPP Quest NetVault Backup Server NVBUJobCountHistory SQL injection attempt (server-webapp.rules) * 1:46284 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios user agent outbound communication attempt (malware-cnc.rules) * 1:46285 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46286 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46287 <-> DISABLED <-> SERVER-WEBAPP Linksys E series denial of service attempt (server-webapp.rules) * 1:46288 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46269 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46300 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46299 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46271 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46298 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46272 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46275 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46276 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46274 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 3:46294 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46295 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46292 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules) * 3:46293 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules) * 3:46296 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0570 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:46278 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46277 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46276 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46275 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46274 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46273 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46272 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46271 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Sanny malware variant FTP login (malware-cnc.rules) * 1:46270 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46269 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46268 <-> ENABLED <-> MALWARE-CNC Win.Downloader.Sanny URI request for known malicious URI (malware-cnc.rules) * 1:46300 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46299 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46298 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46297 <-> DISABLED <-> SERVER-WEBAPP QNAP VioStor NVR and QNAP NAS command injection attempt (server-webapp.rules) * 1:46291 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor file management attempt (malware-backdoor.rules) * 1:46290 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell backdoor detected (malware-backdoor.rules) * 1:46289 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46288 <-> DISABLED <-> MALWARE-BACKDOOR JSP webshell transfer attempt (malware-backdoor.rules) * 1:46287 <-> DISABLED <-> SERVER-WEBAPP Linksys E series denial of service attempt (server-webapp.rules) * 1:46286 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46285 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios inbound delivery attempt (malware-cnc.rules) * 1:46284 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Bandios user agent outbound communication attempt (malware-cnc.rules) * 1:46283 <-> DISABLED <-> SERVER-WEBAPP Quest NetVault Backup Server NVBUJobCountHistory SQL injection attempt (server-webapp.rules) * 1:46282 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46281 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46280 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 1:46279 <-> DISABLED <-> SERVER-SAMBA Samba spoolss denial of service attempt (server-samba.rules) * 3:46296 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0570 attack attempt (server-webapp.rules) * 3:46294 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46295 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2018-0572 attack attempt (server-webapp.rules) * 3:46292 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules) * 3:46293 <-> ENABLED <-> FILE-PDF TRUFFLEHUNTER TALOS-2018-0569 attack attempt (file-pdf.rules)