Talos Rules 2021-02-16
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-chrome, file-image, indicator-obfuscation, malware-cnc, os-linux, os-other, protocol-scada and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (snort3-os-linux.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (snort3-indicator-obfuscation.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (snort3-server-webapp.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (snort3-protocol-scada.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (snort3-server-other.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (snort3-server-webapp.rules)
 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (snort3-os-linux.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (snort3-malware-cnc.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (snort3-server-webapp.rules)

2021-02-16 14:21:28 UTC

Snort Subscriber Rules Update

Date: 2021-02-16

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:57172 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57159 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 1:57174 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57157 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57155 <-> DISABLED <-> PROTOCOL-SCADA Real-time Automation Ethernet/IP buffer over flow attempt (protocol-scada.rules)
 * 1:57161 <-> ENABLED <-> SERVER-OTHER SolarWinds Orion MSMQ remote code execution attempt (server-other.rules)
 * 1:57171 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57168 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57175 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57156 <-> DISABLED <-> OS-LINUX Linux Kernel 4.17 out of bound access attempt (os-linux.rules)
 * 1:57169 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57160 <-> DISABLED <-> INDICATOR-OBFUSCATION Javascript obfuscation using window global (indicator-obfuscation.rules)
 * 1:57170 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57173 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.ObliqueRAT outbound connection attempt (malware-cnc.rules)
 * 1:57158 <-> DISABLED <-> SERVER-WEBAPP Oracle WebLogic consolejndi remote code execution attempt (server-webapp.rules)
 * 3:57164 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57163 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57162 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57165 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2021-1248 attack attempt (file-image.rules)
 * 3:57167 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)
 * 3:57166 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2021-1249 attack attempt (os-other.rules)

Modified Rules:


 * 1:43587 <-> DISABLED <-> SERVER-WEBAPP Apache httpd ap_find_token buffer overread attempt (server-webapp.rules)
 * 3:55037 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)
 * 3:55036 <-> ENABLED <-> BROWSER-CHROME TRUFFLEHUNTER TALOS-2020-1152 attack attempt (browser-chrome.rules)