Talos Rules 2025-01-14
Talos is aware of vulnerabilities affecting products from Microsoft Corporation.

Microsoft Vulnerability CVE-2025-21189: A coding deficiency exists in Microsoft MapUrlToZone that may lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64454 through 64455, Snort 3: GID 1, SID 301122.

Microsoft Vulnerability CVE-2025-21219: A coding deficiency exists in Microsoft MapUrlToZone that may lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64456 through 64457, Snort 3: GID 1, SID 301123.

Microsoft Vulnerability CVE-2025-21269: A coding deficiency exists in Microsoft Windows HTML Platforms that may lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64452 through 64453, Snort 3: GID 1, SID 301121.

Microsoft Vulnerability CVE-2025-21292: A coding deficiency exists in Microsoft Windows Search Service that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64448 through 64449, Snort 3: GID 1, SID 301119.

Microsoft Vulnerability CVE-2025-21299: A coding deficiency exists in Microsoft Windows Kerberos that may lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64446 through 64447, Snort 3: GID 1, SID 301118.

Microsoft Vulnerability CVE-2025-21309: A coding deficiency exists in Microsoft Windows Remote Desktop Services that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 64432, Snort 3: GID 1, SID 64432.

Microsoft Vulnerability CVE-2025-21315: A coding deficiency exists in Microsoft Brokering File System that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64450 through 64451, Snort 3: GID 1, SID 301120.

Microsoft Vulnerability CVE-2025-21354: A coding deficiency exists in Microsoft Excel that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64444 through 64445, Snort 3: GID 1, SID 301117.

Microsoft Vulnerability CVE-2025-21362: A coding deficiency exists in Microsoft Excel that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64435 through 64436, Snort 3: GID 1, SID 301114.

Microsoft Vulnerability CVE-2025-21365: A coding deficiency exists in Microsoft Office that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64433 through 64434, Snort 3: GID 1, SID 301113.

Talos has added and modified multiple rules in the file-office, file-other, malware-cnc, malware-other, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)

Modified Rules:


 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)

Modified Rules:


 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)

Modified Rules:


 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)

Modified Rules:


 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)
 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)

2025-01-14 20:45:40 UTC

Snort Subscriber Rules Update

Date: 2025-01-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:64455 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64453 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64432 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt (os-windows.rules)
 * 1:64433 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64454 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64450 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64444 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64452 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64456 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64434 <-> DISABLED <-> OS-WINDOWS Microsoft Word remote code execution attempt (os-windows.rules)
 * 1:64435 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64441 <-> DISABLED <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt (server-other.rules)
 * 1:64438 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64443 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64457 <-> DISABLED <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt (os-windows.rules)
 * 1:64451 <-> DISABLED <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt (os-windows.rules)
 * 1:64440 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64446 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64437 <-> DISABLED <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt (malware-other.rules)
 * 1:64436 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)
 * 1:64439 <-> DISABLED <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt (malware-cnc.rules)
 * 1:64449 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64442 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:64448 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt (os-windows.rules)
 * 1:64447 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt. (os-windows.rules)
 * 1:64445 <-> DISABLED <-> FILE-OFFICE Microsoft Excel remote code execution attempt (file-office.rules)

Modified Rules:


 * 1:60457 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:60456 <-> DISABLED <-> FILE-OTHER UnRAR directory traversal attempt (file-other.rules)
 * 1:62789 <-> ENABLED <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt (server-webapp.rules)

2025-01-14 20:53:12 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:12 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:12 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:12 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:12 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt


2025-01-14 20:53:13 UTC

Snort Subscriber Rules Update

Date: 2025-01-14-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301113 <-> OS-WINDOWS Microsoft Word remote code execution attempt
* 1:301114 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301115 <-> MALWARE-OTHER Win.Ransomware.CryptNet variant download attempt
* 1:301116 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:301117 <-> FILE-OFFICE Microsoft Excel remote code execution attempt
* 1:301118 <-> OS-WINDOWS Microsoft Windows Kerberos CredentialGuard bypass attempt.
* 1:301119 <-> OS-WINDOWS Microsoft Windows Search Service elevation of privilege attempt
* 1:301120 <-> OS-WINDOWS Microsoft Brokering File System elevation of privilege attempt
* 1:301121 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301122 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:301123 <-> OS-WINDOWS Microsoft Windows MapUrlToZone security feature bypass attempt
* 1:64432 <-> OS-WINDOWS Microsoft Windows Remote Desktop Services remote code execution attempt
* 1:64439 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64440 <-> MALWARE-CNC Win.Ransomware.CryptNet outbound connection attempt
* 1:64441 <-> SERVER-OTHER Fortinet FortiAnalyzer hardcoded SSH credentials use attempt

Modified Rules:

* 1:300253 <-> FILE-OTHER UnRAR directory traversal attempt
* 1:62789 <-> SERVER-WEBAPP Apache Struts file upload directory traversal attempt