Rule Category

EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.

Alert Message

EXPLOIT-KIT Unknown exploit kit redirection page

Rule Explanation

This event is generated when an HTTP redirect is issued by the Unknown exploit kit. Impact: Potential exposure to a malicious web site, which could result in loss of integrity. Details: Unknown begins the attack process against potential victims by redirecting them to a different server than the link the victim originally clicked on. This signature is designed to detect the particular characteristics of the redirection requests, and break the exploit chain before a user is exposed to malicious code if the signature is set to drop packets. Ease of Attack: Simple. The Unknown is commercially available software with technical support.

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None