Talos Rules 2023-01-24
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the deleted, malware-cnc, malware-other, os-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 3:61193 <-> ENABLED <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt (os-other.rules)

Modified Rules:


 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61182 <-> ENABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (snort3-malware-cnc.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (snort3-server-webapp.rules)
 * 1:61192 <-> ENABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (snort3-policy-other.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (snort3-server-webapp.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (snort3-server-webapp.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (snort3-server-webapp.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (snort3-server-webapp.rules)
 * 1:61191 <-> ENABLED <-> MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (snort3-deleted.rules)

Modified Rules:


 * 1:61117 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61121 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61144 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61122 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61133 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61108 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61106 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61109 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61110 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61111 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61146 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61112 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61113 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61142 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61145 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61124 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61152 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61126 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61125 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61132 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (snort3-server-webapp.rules)
 * 1:61147 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61129 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61118 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61150 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61115 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (snort3-server-webapp.rules)
 * 1:61143 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61114 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61107 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61128 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61139 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61151 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61136 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61127 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61130 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61138 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61149 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61148 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61119 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61116 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61135 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61123 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61137 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61131 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61140 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)
 * 1:61141 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (snort3-server-webapp.rules)
 * 1:61134 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (snort3-server-webapp.rules)
 * 1:61120 <-> ENABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (snort3-server-webapp.rules)

2023-01-24 19:34:38 UTC

Snort Subscriber Rules Update

Date: 2023-01-24

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61176 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61174 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61189 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61180 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61173 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61175 <-> DISABLED <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download (malware-other.rules)
 * 1:61178 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61179 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt (server-webapp.rules)
 * 1:61184 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61177 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt (server-webapp.rules)
 * 1:61182 <-> DISABLED <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt (malware-cnc.rules)
 * 1:61183 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61188 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61181 <-> ENABLED <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt (server-webapp.rules)
 * 1:61186 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61187 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt (malware-other.rules)
 * 1:61192 <-> DISABLED <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected (policy-other.rules)
 * 1:61185 <-> DISABLED <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61190 <-> DISABLED <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt (malware-other.rules)
 * 1:61191 <-> DISABLED <-> DELETED MALWARE-CNC Windows.Malware.Dacls command and control beacon attempt (deleted.rules)

Modified Rules:


 * 1:61111 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61106 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61117 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61109 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61115 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt (server-webapp.rules)
 * 1:61147 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61119 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61112 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61120 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61121 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61122 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61145 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61128 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61139 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61150 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61149 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61137 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61107 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61108 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61151 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61124 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61136 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61152 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61141 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61125 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61142 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61143 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61116 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61114 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61140 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61126 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61146 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61118 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61127 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61148 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61135 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61144 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61138 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61113 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61110 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61129 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61123 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)
 * 1:61130 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61131 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner SQL injection attempt (server-webapp.rules)
 * 1:61132 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt (server-webapp.rules)
 * 1:61133 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner directory traversal attempt (server-webapp.rules)
 * 1:61134 <-> DISABLED <-> SERVER-WEBAPP Fscan scanner command injection attempt (server-webapp.rules)

2023-01-24 19:38:22 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:22 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:22 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:22 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:22 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:23 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:24 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt


2023-01-24 19:38:24 UTC

Snort Subscriber Rules Update

Date: 2023-01-24-001

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300370 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300371 <-> MALWARE-OTHER Win.Malware.LightNeuron mail transfer agent download
* 1:300372 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300373 <-> MALWARE-OTHER Windows.Malware.Dacls malware file download attempt
* 1:300374 <-> MALWARE-OTHER Unix.Malware.Dacls logcollector file download attempt
* 1:300375 <-> MALWARE-OTHER Unix.Malware.Dacls malware file download attempt
* 1:61177 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61178 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP webshell access attempt
* 1:61179 <-> SERVER-WEBAPP SugarCRM EmailTemplates PHP file injection attempt
* 1:61180 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61181 <-> SERVER-WEBAPP SugarCRM EmailTemplates authentication bypass attempt
* 1:61182 <-> MALWARE-CNC Win.Spyware.Carbon outbound connection attempt
* 1:61192 <-> POLICY-OTHER Veeam Backup and Replication empty user name login detected
* 3:61193 <-> OS-OTHER TRUFFLEHUNTER TALOS-2022-1688 attack attempt

Modified Rules:

* 1:61106 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61107 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61108 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61109 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61110 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61111 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61112 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61113 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61114 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61115 <-> SERVER-WEBAPP Fscan scanner arbitrary JSP file upload attempt
* 1:61116 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61117 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61118 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61119 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61120 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61121 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61122 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61123 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61124 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61125 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61126 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61127 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61128 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61129 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61130 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61131 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61132 <-> SERVER-WEBAPP Fscan scanner PHP object injection attempt
* 1:61133 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61134 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61135 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61136 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61137 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61138 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61139 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61140 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61141 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61142 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61143 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61144 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61145 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61146 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61147 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61148 <-> SERVER-WEBAPP Fscan scanner command injection attempt
* 1:61149 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61150 <-> SERVER-WEBAPP Fscan scanner directory traversal attempt
* 1:61151 <-> SERVER-WEBAPP Fscan scanner SQL injection attempt
* 1:61152 <-> SERVER-WEBAPP Fscan scanner command injection attempt