Talos Rules 2026-01-06
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-multimedia, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 21:59:22 UTC

Snort Subscriber Rules Update

Date: 2026-01-06

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65640 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65637 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65633 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65626 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65631 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65628 <-> DISABLED <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt (server-webapp.rules)
 * 1:65635 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 1:65625 <-> DISABLED <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt (server-webapp.rules)
 * 1:65634 <-> ENABLED <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65627 <-> DISABLED <-> FILE-OTHER RARLAB WinRAR directory traversal attempt (file-other.rules)
 * 1:65632 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65629 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65630 <-> ENABLED <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt (malware-cnc.rules)
 * 1:65636 <-> ENABLED <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt (malware-other.rules)
 * 3:65639 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65645 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65642 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65641 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt (file-multimedia.rules)
 * 3:65644 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)
 * 3:65638 <-> ENABLED <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt (file-multimedia.rules)
 * 3:65643 <-> ENABLED <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt (server-webapp.rules)

Modified Rules:


 * 1:62935 <-> ENABLED <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt (server-webapp.rules)
 * 3:65617 <-> ENABLED <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt (malware-cnc.rules)

2026-01-06 22:02:13 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:13 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:13 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:13 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:13 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt


2026-01-06 22:02:14 UTC

Snort Subscriber Rules Update

Date: 2026-01-06-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301365 <-> FILE-OTHER RARLAB WinRAR directory traversal attempt
* 1:301366 <-> MALWARE-OTHER Py.Infostealer.Eternidade variant communication attempt
* 1:65625 <-> SERVER-WEBAPP D-Link Routers GetDeviceSettings buffer overflow attempt
* 1:65628 <-> SERVER-WEBAPP LangChain ChatChat directory traversal attempt
* 1:65629 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65630 <-> MALWARE-CNC Py.Infostealer.Eternidade variant communication attempt
* 1:65631 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65632 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65633 <-> MALWARE-CNC Win.Trojan.Eternidade variant communication attempt
* 1:65634 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65637 <-> MALWARE-CNC Vbs.Trojan.Eternidade variant communication attempt
* 1:65640 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 3:65638 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65639 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2314 attack attempt
* 3:65641 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65642 <-> FILE-MULTIMEDIA TRUFFLEHUNTER TALOS-2025-2311 attack attempt
* 3:65643 <-> SERVER-WEBAPP Cisco Secure Email Gateway remote code execution attempt
* 3:65644 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt
* 3:65645 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt

Modified Rules:

* 1:62935 <-> SERVER-WEBAPP Fortra GoAnywhere MFT authentication bypass attempt
* 3:65617 <-> MALWARE-CNC Unix.Backdoor.AquaShell inbound connection attempt