MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Win.Trojan.StayinAlive outbound connection attempt
This rule looks for a malicious HTTP request that's related to the post-exploitation of CVE-2022-23748 and that might be exfiltrating sensitive information to threat actors related to the Stayin' Alive campaign.
This rule will alert when an outbound connection related to the post-exploitation of CVE-2022-23748 has been detected in the network.
Attacks/Scans seen in the wild
No known false positives
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Command and Control::Application Layer Protocol
Insecure Deserialization
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.
CVE-2022-23748 |
Loading description
|