Rule Category

PUA-OTHER -- Snort has detected a Potentially Unwanted Application (PUA). This Is a program which installs adware or toolbars, collects information, runs unwanted processes that consume computing resources, or has otherwise unclear objectives. These are usually additional programs bundled with legitimate programs. Some users consider the benefit of the main application to outweigh the risks of the PUA; you are paying for a free product by contributing with advertising or data. These alerts are often assigned a lower risk, as they are not directly malicious or as fast-spreading as worms or trojans. This alert concerns traffic typical of PUAs that are not common enough to warrant their own category. This is commonly associated with cryptocurrency mining activity.

Alert Message

PUA-OTHER Moonify TLS server hello attempt

Rule Explanation

This event is generated when a server responds with SSL hello packet containing moonify.io Impact: Misc Attack Details: Server response to starting an ssl connection with cryptocurrency mining servers Ease of Attack:

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None