Talos has added and modified multiple rules in the malware-cnc, malware-other, os-windows, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:63369 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63353 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 1:63368 <-> ENABLED <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection (malware-cnc.rules) * 1:63362 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63359 <-> DISABLED <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt (server-webapp.rules) * 1:63351 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected (os-windows.rules) * 1:63366 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63354 <-> DISABLED <-> POLICY-OTHER Apache Airflow Experimental API access attempt (policy-other.rules) * 1:63370 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt (malware-other.rules) * 1:63355 <-> DISABLED <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt (policy-other.rules) * 1:63367 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63365 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63364 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63363 <-> ENABLED <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt (malware-other.rules) * 1:63352 <-> DISABLED <-> SERVER-OTHER VMware multiple products privilege escalation attempt (server-other.rules) * 3:63358 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture status request detected (policy-other.rules) * 3:63361 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone XML service request detected (policy-other.rules) * 3:63360 <-> ENABLED <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt (server-webapp.rules) * 3:63357 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected (policy-other.rules) * 3:63356 <-> ENABLED <-> POLICY-OTHER Cisco IP Phone packet capture request detected (policy-other.rules)
* 1:62851 <-> DISABLED <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt (server-webapp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:300896 <-> SERVER-OTHER VMware multiple products privilege escalation attempt * 1:300897 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300898 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300899 <-> MALWARE-OTHER Win.Trojan.IcedID Loader DLL download attempt * 1:300900 <-> MALWARE-OTHER Win.Trojan.IcedID Powershell Stager download attempt * 1:63351 <-> OS-WINDOWS Microsoft Windows NTLM tampering attempt detected * 1:63354 <-> POLICY-OTHER Apache Airflow Experimental API access attempt * 1:63355 <-> POLICY-OTHER ManageEngine Desktop Central potential backdoor access attempt * 3:63356 <-> POLICY-OTHER Cisco IP Phone packet capture request detected * 3:63357 <-> POLICY-OTHER Cisco IP Phone packet capture stop request detected * 3:63358 <-> POLICY-OTHER Cisco IP Phone packet capture status request detected * 1:63359 <-> SERVER-WEBAPP PHP unserialize datetimezone object code execution attempt * 3:63360 <-> SERVER-WEBAPP Cisco IP Phone denial of service attempt * 3:63361 <-> POLICY-OTHER Cisco IP Phone XML service request detected * 1:63368 <-> MALWARE-CNC Win.Trojan.IcedID Powershell Stager outbound connection
* 1:35053 <-> BROWSER-IE Microsoft Internet Explorer CSVGMarkerElement use after free attempt * 1:62851 <-> SERVER-WEBAPP Schneider Electric IIoT Monitor frmUpdateSetting directory traversal attempt