Talos has added and modified multiple rules in the file-office, file-other, file-pdf, malware-cnc, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49326 <-> DISABLED <-> SERVER-WEBAPP Rockwell Automation Allen-Bradley PowerMonitor 1000 cross site scripting attempt (server-webapp.rules) * 1:49333 <-> ENABLED <-> OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt (os-windows.rules) * 1:49329 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49331 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49327 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49332 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49330 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49328 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules)
* 1:49295 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49253 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:49289 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:49294 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49290 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:48837 <-> DISABLED <-> SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt (server-webapp.rules) * 1:49254 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:38575 <-> DISABLED <-> SERVER-OTHER OpenSSL TLS change cipher spec protocol denial of service attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49328 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49333 <-> ENABLED <-> OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt (os-windows.rules) * 1:49329 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49330 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49331 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49327 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49326 <-> DISABLED <-> SERVER-WEBAPP Rockwell Automation Allen-Bradley PowerMonitor 1000 cross site scripting attempt (server-webapp.rules) * 1:49332 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules)
* 1:49290 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:49294 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:38575 <-> DISABLED <-> SERVER-OTHER OpenSSL TLS change cipher spec protocol denial of service attempt (server-other.rules) * 1:48837 <-> DISABLED <-> SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt (server-webapp.rules) * 1:49253 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:49254 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:49295 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49289 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091200.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49332 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49331 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49330 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49329 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49328 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49327 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49326 <-> DISABLED <-> SERVER-WEBAPP Rockwell Automation Allen-Bradley PowerMonitor 1000 cross site scripting attempt (server-webapp.rules) * 1:49333 <-> ENABLED <-> OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt (os-windows.rules)
* 1:49289 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:49294 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:38575 <-> DISABLED <-> SERVER-OTHER OpenSSL TLS change cipher spec protocol denial of service attempt (server-other.rules) * 1:48837 <-> DISABLED <-> SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt (server-webapp.rules) * 1:49253 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:49254 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:49295 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49290 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49326 <-> DISABLED <-> SERVER-WEBAPP Rockwell Automation Allen-Bradley PowerMonitor 1000 cross site scripting attempt (snort3-server-webapp.rules) * 1:49333 <-> ENABLED <-> OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt (snort3-os-windows.rules) * 1:49327 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (snort3-malware-cnc.rules) * 1:49332 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (snort3-malware-cnc.rules) * 1:49331 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (snort3-malware-cnc.rules) * 1:49329 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (snort3-malware-cnc.rules) * 1:49330 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (snort3-malware-cnc.rules) * 1:49328 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (snort3-malware-cnc.rules)
* 1:49295 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (snort3-file-pdf.rules) * 1:49290 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (snort3-file-other.rules) * 1:49289 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (snort3-file-other.rules) * 1:48837 <-> DISABLED <-> SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt (snort3-server-webapp.rules) * 1:49253 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (snort3-file-office.rules) * 1:49254 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (snort3-file-office.rules) * 1:49294 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (snort3-file-pdf.rules) * 1:38575 <-> DISABLED <-> SERVER-OTHER OpenSSL TLS change cipher spec protocol denial of service attempt (snort3-server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49326 <-> DISABLED <-> SERVER-WEBAPP Rockwell Automation Allen-Bradley PowerMonitor 1000 cross site scripting attempt (server-webapp.rules) * 1:49332 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49331 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Arescrypt malicious ransomware download attempt (malware-cnc.rules) * 1:49330 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49328 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49329 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49327 <-> ENABLED <-> MALWARE-CNC Win.Ransomware.Crytekk variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49333 <-> ENABLED <-> OS-WINDOWS Microsoft Windows DHCP Server remote code execution attempt (os-windows.rules)
* 1:49290 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:49295 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49289 <-> ENABLED <-> FILE-OTHER WinRAR ACE remote code execution attempt (file-other.rules) * 1:49294 <-> ENABLED <-> FILE-PDF Adobe Acrobat out of bounds read attempt (file-pdf.rules) * 1:49253 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:38575 <-> DISABLED <-> SERVER-OTHER OpenSSL TLS change cipher spec protocol denial of service attempt (server-other.rules) * 1:49254 <-> DISABLED <-> FILE-OFFICE Microsoft Office Word styleWithEffects use-after-free attempt (file-office.rules) * 1:48837 <-> DISABLED <-> SERVER-WEBAPP ThinkPHP 5.0.23/5.1.31 command injection attempt (server-webapp.rules)