Rule Category

EXPLOIT-KIT -- Snort has alerted on traffic that is typical of known exploit kits. Exploit kits are pre-packaged sets of code and malware geared toward finding and taking advantage of common browser vulnerabilities. They are Javascript code that provides an entry point to a system to initiate the next state. Snort's rules look for known exploit kit nomenclature, information sent back exposing sensitive infrastructure, attempts to reach a certain file, etc. Rules try to identify the exact kit being used based on actor-group patterns, such as favored target website, malware types, and code similarities.

Alert Message

EXPLOIT-KIT Flim exploit kit outbound jar request

Rule Explanation

This event is generated when a user downloads files characteristic of an in-progress attack by the Flim exploit kit. Impact: Potential compromise of the victim system. Loss of integrity. Details: This signature detects systems attempting to download a malicious file known to be delivered as part of attacks by the Flim exploit kit. This file is only downloaded once a victim has reached a live kit; if the machine requesting this file is vulnerable to any of the attacks delivered by the Flim exploit kit, it is likely compromised. Ease of Attack: Simple. The Flim is commercially available software with technical support.

What To Look For

No information provided

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None