Talos Rules 2025-02-25
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-executable, file-other, indicator-compromise, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:06:11 UTC

Snort Subscriber Rules Update

Date: 2025-02-25

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64595 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64605 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64598 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64611 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64607 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64609 <-> ENABLED <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt (malware-cnc.rules)
 * 1:64610 <-> DISABLED <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt (malware-cnc.rules)
 * 1:64608 <-> ENABLED <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt (malware-other.rules)
 * 1:64604 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64597 <-> DISABLED <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt (server-webapp.rules)
 * 1:64606 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64596 <-> DISABLED <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt (indicator-compromise.rules)
 * 1:64603 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64599 <-> DISABLED <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt (server-webapp.rules)
 * 1:64602 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 1:64600 <-> ENABLED <-> SERVER-WEBAPP SimpleHelp directory traversal attempt (server-webapp.rules)
 * 1:64601 <-> ENABLED <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt (malware-other.rules)
 * 3:64612 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)
 * 3:64613 <-> ENABLED <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt (file-executable.rules)

Modified Rules:


 * 1:64553 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52235 <-> DISABLED <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt (server-webapp.rules)
 * 1:64552 <-> DISABLED <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt (file-other.rules)
 * 1:52287 <-> DISABLED <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt (server-other.rules)

2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:27 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:28 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:28 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:28 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:28 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt


2025-02-25 14:09:28 UTC

Snort Subscriber Rules Update

Date: 2025-02-24-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301149 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301150 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301151 <-> MALWARE-OTHER Win.Loader.TetraLoader variant download attempt
* 1:301152 <-> MALWARE-OTHER Win.Shellcode.CobaltStrike variant download attempt
* 1:64595 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64596 <-> INDICATOR-COMPROMISE XMRig cryptocurrency miner download attempt
* 1:64597 <-> SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt
* 1:64598 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64599 <-> SERVER-WEBAPP Zyxel DSL CPE OS command injection attempt
* 1:64600 <-> SERVER-WEBAPP SimpleHelp directory traversal attempt
* 1:64609 <-> MALWARE-CNC Win.Trojan.VShell variant outbound connection attempt
* 1:64610 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 1:64611 <-> MALWARE-CNC Win.Trojan.SlowStepper variant outbound communication attempt
* 3:64612 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt
* 3:64613 <-> FILE-EXECUTABLE TRUFFLEHUNTER TALOS-2025-2151 attack attempt

Modified Rules:

* 1:301142 <-> FILE-OTHER ERDAS ERS Viewer ERM_convert_to_correct_webpath buffer overflow attempt
* 1:52235 <-> SERVER-WEBAPP Wget HTTP non-200 negative chunk-size buffer overflow attempt
* 1:52287 <-> SERVER-OTHER Hummingbird InetD LPD buffer overflow attempt