OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows raw WriteAndX InData pointer adjustment attempt
This event is generated when an attempt to exploit an SMB connection using exploits seen in the APT3 Bemstour campaign. Impact: Potential Remote Code Execution Details: This alert is triggered when SMB traffic that closely resembles an exploit observed in the APT3 Bemstour campaign. This rule is a generic rule used to detect suspicious activity in the SMB transactions that could indicate an exploit. Ease of Attack: Simple
This rule fires when an attempt to exploit a Windows SMB vulnerability is detected on the network.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Initial Access
Technique: Exploit Public-Facing Application
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org