Talos has added and modified multiple rules in the malware-cnc, os-other, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 3:60331 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60332 <-> ENABLED <-> SERVER-WEBAPP UPnP SOAP request detected (server-webapp.rules) * 3:60336 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60333 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60335 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules) * 3:60330 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-other.rules) * 3:60334 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (snort3-malware-cnc.rules) * 1:60318 <-> ENABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (snort3-server-webapp.rules) * 1:60328 <-> ENABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (snort3-server-webapp.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (snort3-malware-cnc.rules) * 1:60322 <-> ENABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (snort3-server-other.rules) * 1:60323 <-> ENABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (snort3-server-other.rules) * 1:60329 <-> ENABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (snort3-server-webapp.rules) * 1:60321 <-> ENABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (snort3-server-other.rules) * 1:60319 <-> ENABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (snort3-server-other.rules) * 1:60320 <-> ENABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (snort3-server-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:60315 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60322 <-> DISABLED <-> SERVER-OTHER Valve Source Engine Query denial of service attempt (server-other.rules) * 1:60321 <-> DISABLED <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt (server-other.rules) * 1:60329 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60328 <-> DISABLED <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt (server-webapp.rules) * 1:60318 <-> DISABLED <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt (server-webapp.rules) * 1:60316 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60320 <-> DISABLED <-> SERVER-OTHER AmongUs Game Server denial of service attempt (server-other.rules) * 1:60317 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60323 <-> DISABLED <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt (server-other.rules) * 1:60314 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt (os-windows.rules) * 1:60327 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules) * 1:60319 <-> DISABLED <-> SERVER-OTHER TeamSpeak Server denial of service attempt (server-other.rules) * 1:60325 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60324 <-> ENABLED <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection (malware-cnc.rules) * 1:60326 <-> DISABLED <-> OS-OTHER Apple multiple products memory corruption attempt (os-other.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:300223 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300224 <-> OS-WINDOWS Microsoft Windows Print Spooler elevation of privilege attempt * 1:300225 <-> OS-OTHER Apple multiple products memory corruption attempt * 1:60318 <-> SERVER-WEBAPP Pi-hole AdminLTE AddMAC authenticated command injection attempt * 1:60319 <-> SERVER-OTHER TeamSpeak Server denial of service attempt * 1:60320 <-> SERVER-OTHER AmongUs Game Server denial of service attempt * 1:60321 <-> SERVER-OTHER Garry Mod Physics Sandbox denial of service attempt * 1:60322 <-> SERVER-OTHER Valve Source Engine Query denial of service attempt * 1:60323 <-> SERVER-OTHER Counter-Strike Global Offensive denial of service attempt * 1:60324 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60325 <-> MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection * 1:60328 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 1:60329 <-> SERVER-WEBAPP Atlassian Jira Seraph authentication bypass attempt * 3:60330 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60331 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60332 <-> SERVER-WEBAPP UPnP SOAP request detected * 3:60333 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60334 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60335 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt * 3:60336 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1583 attack attempt