MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Andr.Spyware.Catwatchful client app variant post-compromise outbound connection detected
This event is generated when an Andr.Spyware.Catwatchful client app forms an outbound connection. This is not an malicious program; however, it is accessing unauthorized data stolen from another person through a malicious application. Impact: A Network Trojan was detected Details: Ease of Attack: An attacker has to have physical access to a phone to download this client application.
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None