Talos Rules 2022-08-30
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-office, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)
 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 3:60500 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60501 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt (file-office.rules)
 * 3:60499 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60496 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt (snort3-malware-other.rules)
 * 1:60484 <-> ENABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (snort3-server-webapp.rules)
 * 1:60485 <-> ENABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (snort3-server-webapp.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt (snort3-malware-other.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt (snort3-malware-other.rules)
 * 1:60486 <-> ENABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (snort3-server-webapp.rules)

Modified Rules:


 * 1:21420 <-> ENABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (snort3-file-other.rules)

2022-08-30 13:48:47 UTC

Snort Subscriber Rules Update

Date: 2022-08-30

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:60489 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60486 <-> DISABLED <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt (server-webapp.rules)
 * 1:60484 <-> DISABLED <-> SERVER-WEBAPP Django trunc SQL injection attempt (server-webapp.rules)
 * 1:60487 <-> DISABLED <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt (server-webapp.rules)
 * 1:60498 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell outbound connection attempt (malware-cnc.rules)
 * 1:60491 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60497 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60495 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell download attempt (malware-other.rules)
 * 1:60496 <-> ENABLED <-> MALWARE-CNC Php.Webshell.Exoshell inbound connection attempt (malware-cnc.rules)
 * 1:60488 <-> DISABLED <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt (malware-other.rules)
 * 1:60492 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60493 <-> DISABLED <-> MALWARE-OTHER PacketWhisper download attempt (malware-other.rules)
 * 1:60494 <-> ENABLED <-> MALWARE-OTHER Php.Webshell.Exoshell upload attempt (malware-other.rules)
 * 1:60490 <-> DISABLED <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt (malware-other.rules)
 * 1:60485 <-> DISABLED <-> SERVER-WEBAPP Django extract SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:21420 <-> DISABLED <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt (file-other.rules)
 * 1:21484 <-> DISABLED <-> FILE-OTHER ZIP file name overflow attempt (file-other.rules)

2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt


2022-08-30 13:52:24 UTC

Snort Subscriber Rules Update

Date: 2022-08-29-002

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300258 <-> MALWARE-OTHER PacketWhisper decloakify.py download attempt
* 1:300259 <-> MALWARE-OTHER PacketWhisper cloakify.py download attempt
* 1:300260 <-> MALWARE-OTHER PacketWhisper download attempt
* 1:300261 <-> MALWARE-OTHER Php.Webshell.Exoshell transfer attempt
* 1:60484 <-> SERVER-WEBAPP Django trunc SQL injection attempt
* 1:60485 <-> SERVER-WEBAPP Django extract SQL injection attempt
* 1:60486 <-> SERVER-WEBAPP Microsoft Exchange Server MailboxExport arbitrary file write attempt
* 1:60487 <-> SERVER-WEBAPP Sophos Firewall User Portal and Webadmin authentication bypass attempt
* 1:60496 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60497 <-> MALWARE-OTHER Php.Webshell.Exoshell inbound connection attempt
* 1:60498 <-> MALWARE-OTHER Php.Webshell.Exoshell outbound connection attempt
* 3:60499 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2022-1597 attack attempt
* 3:60500 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt
* 3:60501 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2022-1591 attack attempt

Modified Rules:

* 1:21420 <-> FILE-OTHER RealNetworks RealPlayer compressed skin overflow attempt
* 1:21484 <-> FILE-OTHER ZIP file name overflow attempt