Talos Rules 2018-11-27
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-plugins and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (server-webapp.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)

Modified Rules:



2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (server-webapp.rules)
 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)

Modified Rules:



2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (snort3-browser-plugins.rules)
 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (snort3-browser-plugins.rules)
 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (snort3-malware-cnc.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (snort3-server-webapp.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (snort3-malware-cnc.rules)

Modified Rules:



2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091100.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (server-webapp.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)

Modified Rules:



2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (server-webapp.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)

Modified Rules:



2018-11-27 14:17:12 UTC

Snort Subscriber Rules Update

Date: 2018-11-27

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091200.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:48445 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48444 <-> ENABLED <-> MALWARE-CNC Win.Malware.DNSpionage variant outbound connection (malware-cnc.rules)
 * 1:48443 <-> DISABLED <-> SERVER-WEBAPP Nagios XI magpie_debug.php command argument injection attempt (server-webapp.rules)
 * 1:48442 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)
 * 1:48441 <-> DISABLED <-> BROWSER-PLUGINS Fourier Systems DaqLab ActiveX clsid access attempt (browser-plugins.rules)

Modified Rules: