MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Osx.Trojan.Mokes variant outbound cnc connection
This event is generated when an Osx.Trojan.Agent is detected on the network making an outbound connection. Impact: A Network Trojan was detected Details: This rule fires when an Osx.Trojan.Agent dropped by the Firefox 0-days (CVE-2019-11707 and CVE-2019-11708) is detected on the network. Ease of Attack:
This rule fires when a Osx.Trojan.Mokes variant is detected on the network making an outbound cnc connection.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
N/A
Not Applicable
CVE-2019-11707 |
Loading description
|
Tactic: Command and Control
Technique: Standard Application Layer Protocol
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org