Talos has added and modified multiple rules in the malware-cnc, malware-other, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 3:62736 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62735 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62703 <-> ENABLED <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt (server-other.rules) * 3:62723 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt (policy-other.rules) * 3:62724 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt (policy-other.rules) * 3:62725 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt (policy-other.rules) * 3:62726 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62737 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62727 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62728 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt (server-webapp.rules) * 3:62734 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt (policy-other.rules) * 3:62729 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62730 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62731 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt (server-webapp.rules) * 3:62732 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules) * 3:62733 <-> ENABLED <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt (server-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:62714 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62704 <-> DISABLED <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt (server-webapp.rules) * 1:62713 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62710 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62709 <-> DISABLED <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection (malware-cnc.rules) * 1:62705 <-> DISABLED <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt (server-webapp.rules) * 1:62716 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62719 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62711 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62721 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Andariel outbound connection (malware-cnc.rules) * 1:62712 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62707 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62718 <-> DISABLED <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt (malware-other.rules) * 1:62706 <-> DISABLED <-> SERVER-OTHER Scala LazyList insecure deserialization attempt (server-other.rules) * 1:62708 <-> DISABLED <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt (server-webapp.rules) * 1:62720 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62722 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt (malware-other.rules) * 1:62715 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules) * 1:62717 <-> DISABLED <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt (malware-other.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:300768 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300769 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300770 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300771 <-> MALWARE-OTHER Win.Malware.Lumma variant download attempt * 1:300772 <-> MALWARE-OTHER Unix.Ransomware.U-Bomb download attempt * 3:62703 <-> SERVER-OTHER Cisco Firepower Threat Defense ICMPv6 denial of service attempt * 1:62704 <-> SERVER-WEBAPP rConfig configDevice.php cross site scripting attempt * 1:62705 <-> SERVER-WEBAPP Microsoft SharePoint Server Web Parts command injection attempt * 1:62706 <-> SERVER-OTHER Scala LazyList insecure deserialization attempt * 1:62707 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62708 <-> SERVER-WEBAPP Open Game Panel authenticated command injection attempt * 1:62709 <-> MALWARE-CNC Win.Malware.Lumma variant outbound connection * 1:62720 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 1:62721 <-> MALWARE-CNC Win.Trojan.Andariel outbound connection * 1:62722 <-> MALWARE-OTHER Win.Trojan.Andariel malicious download attempt * 3:62723 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1863 attack attempt * 3:62724 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1865 attack attempt * 3:62725 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1866 attack attempt * 3:62726 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62727 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62728 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1867 attack attempt * 3:62729 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62730 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62731 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1869 attack attempt * 3:62732 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62733 <-> SERVER-OTHER TRUFFLEHUNTER TALOS-2023-1862 attack attempt * 3:62734 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62735 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62736 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt * 3:62737 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2023-1861 attack attempt
* 1:19559 <-> INDICATOR-SCAN SSH brute force login attempt