Talos Rules 2024-02-20
This release adds and modifies rules in several categories.

Talos is releasing coverage for a Microsoft Outlook vulnerability, CVE-2024-21413, that could allow a leak of NTLM credentials, potentially leading to remote code execution. Snort 2: GID 1, SID 63053, Snort 3: GID 1, SID 63053.

Talos also has added and modified multiple rules in the file-office, malware-cnc and policy-other rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 3:63048 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt (policy-other.rules)
 * 3:63049 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt (policy-other.rules)
 * 3:63051 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt (policy-other.rules)
 * 3:63052 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt (policy-other.rules)

Modified Rules:



2024-02-20 20:45:26 UTC

Snort Subscriber Rules Update

Date: 2024-02-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:63030 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63031 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63025 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63028 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63044 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63023 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt (file-office.rules)
 * 1:63026 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63053 <-> ENABLED <-> FILE-OFFICE Microsoft Outlook remote code execution attempt (file-office.rules)
 * 1:63050 <-> DISABLED <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt (policy-other.rules)
 * 1:63034 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63027 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63054 <-> DISABLED <-> POLICY-OTHER Email containing links with file URI scheme detected (policy-other.rules)
 * 1:63047 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63038 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63040 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63042 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63036 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63029 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63032 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63043 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63024 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt (malware-other.rules)
 * 1:63033 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63046 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63035 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63039 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection (malware-cnc.rules)
 * 1:63045 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)
 * 1:63037 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt (malware-other.rules)
 * 1:63041 <-> DISABLED <-> MALWARE-CNC Win.Trojan.MysticStealer Download (malware-cnc.rules)

Modified Rules:



2024-02-20 20:47:56 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules:



2024-02-20 20:47:57 UTC

Snort Subscriber Rules Update

Date: 2024-02-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300828 <-> MALWARE-OTHER Win.Trojan.Lagtoy variant download attempt
* 1:300829 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300830 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300831 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300832 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300833 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300834 <-> MALWARE-OTHER Win.Trojan.Metasploit variant download attempt
* 1:300835 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300836 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300837 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:300838 <-> MALWARE-CNC Win.Trojan.MysticStealer Download
* 1:63023 <-> FILE-OFFICE Microsoft Outlook Calendar invite credential leak attempt
* 1:63038 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 1:63039 <-> MALWARE-CNC Win.Trojan.MysticStealer CNC initial connection
* 3:63048 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1943 attack attempt
* 3:63049 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1942 attack attempt
* 1:63050 <-> POLICY-OTHER Chisel proxy tunnel outbound connection attempt
* 3:63051 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1941 attack attempt
* 3:63052 <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2024-1940 attack attempt
* 1:63053 <-> FILE-OFFICE Microsoft Outlook remote code execution attempt
* 1:63054 <-> POLICY-OTHER Email containing links with file URI scheme detected

Modified Rules: