Talos has added and modified multiple rules in the exploit-kit, file-image, file-office, file-other, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 3:62355 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62356 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62352 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62360 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62358 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules) * 3:62361 <-> ENABLED <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt (file-office.rules) * 3:62354 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62357 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62351 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62353 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62350 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt (file-image.rules) * 3:62359 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt (file-other.rules)
* 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules) * 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62334 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62320 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62343 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62330 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62333 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62328 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62338 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62348 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62323 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62349 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:62347 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt (os-windows.rules) * 1:62326 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62336 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62332 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62339 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62337 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62327 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62331 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62346 <-> ENABLED <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt (server-webapp.rules) * 1:62340 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules) * 1:62335 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62324 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62325 <-> ENABLED <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt (malware-cnc.rules) * 1:62342 <-> DISABLED <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt (server-webapp.rules) * 1:62329 <-> ENABLED <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt (server-webapp.rules) * 1:62319 <-> ENABLED <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt (malware-other.rules) * 1:62344 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62321 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62345 <-> DISABLED <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt (server-webapp.rules) * 1:62322 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt (malware-other.rules) * 1:62341 <-> DISABLED <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt (file-other.rules)
* 1:44738 <-> DISABLED <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected (exploit-kit.rules) * 1:47178 <-> DISABLED <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection (malware-cnc.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:300671 <-> MALWARE-OTHER Win.Tool.SuperShell executable download attempt * 1:300672 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300673 <-> MALWARE-OTHER Win.Trojan.Agent executable download attempt * 1:300674 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300675 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300676 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300677 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:300678 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300679 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:300680 <-> FILE-OTHER RARLabs WinRAR ZIP file code execution attempt * 1:62325 <-> MALWARE-CNC Win.Dropper.PhoenixMiner dropper download attempt * 1:62326 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62331 <-> SERVER-WEBAPP Adobe ColdFusion ComponentFilter code execution attempt * 1:62342 <-> SERVER-WEBAPP Openfire XMPP Administration Console directory traversal attempt * 1:62343 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62344 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62345 <-> SERVER-WEBAPP Citrix FileShare directory traversal attempt * 1:62346 <-> SERVER-WEBAPP Ivanti Sentry MICSLogService command execution attempt * 1:62347 <-> OS-WINDOWS Microsoft Windows MSMQ remote code execution attempt * 1:62348 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:62349 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 3:62350 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62351 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62352 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62353 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62354 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62355 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62356 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62357 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2023-1830 attack attempt * 3:62358 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62359 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2023-1818 attack attempt * 3:62360 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt * 3:62361 <-> FILE-OFFICE TRUFFLEHUNTER TALOS-2023-1825 attack attempt
* 1:44738 <-> EXPLOIT-KIT Sundown/Terror/Grandsoft/Magnitude exploit kit landing page detected * 1:47178 <-> MALWARE-CNC Win.Trojan.NukeSped RAT variant outbound connection