Talos Rules 2026-01-13
Talos is aware of vulnerabilities affecting products from Microsoft Corporation.

Microsoft Vulnerability CVE-2026-20805: A coding deficiency exists in Microsoft Desktop Window Manager that may lead to an information disclosure.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65663 through 65664, Snort 3: GID 1, SID 301368.

Microsoft Vulnerability CVE-2026-20816: A coding deficiency exists in Microsoft Windows Installer that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65665 through 65666, Snort 3: GID 1, SID 301369.

Microsoft Vulnerability CVE-2026-20817: A coding deficiency exists in Microsoft Windows Error Reporting Service that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65675 through 65676, Snort 3: GID 1, SID 301374.

Microsoft Vulnerability CVE-2026-20820: A coding deficiency exists in Microsoft Windows Common Log File System Driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65667 through 65668, Snort 3: GID 1, SID 301370.

Microsoft Vulnerability CVE-2026-20840: A coding deficiency exists in Microsoft Windows NTFS that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65671 through 65672, Snort 3: GID 1, SID 301372.

Microsoft Vulnerability CVE-2026-20843: A coding deficiency exists in Microsoft Windows Routing and Remote Access Service (RRAS) that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65669 through 65670, Snort 3: GID 1, SID 301371.

Microsoft Vulnerability CVE-2026-20860: A coding deficiency exists in Microsoft Windows Ancillary Function Driver for WinSock that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65498 through 65499, Snort 3: GID 1, SID 301344.

Microsoft Vulnerability CVE-2026-20871: A coding deficiency exists in Microsoft Desktop Windows Manager that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65673 through 65674, Snort 3: GID 1, SID 301373.

Microsoft Vulnerability CVE-2026-20922: A coding deficiency exists in Microsoft Windows NTFS that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 65671 through 65672, Snort 3: GID 1, SID 301372.

Talos has added and modified multiple rules in the malware-cnc, malware-tools and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:10:30 UTC

Snort Subscriber Rules Update

Date: 2026-01-13

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65676 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65685 <-> DISABLED <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt (malware-cnc.rules)
 * 1:65683 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65667 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65673 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65663 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65657 <-> DISABLED <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt (server-webapp.rules)
 * 1:65684 <-> DISABLED <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt (malware-cnc.rules)
 * 1:65675 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt (os-windows.rules)
 * 1:65664 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt (os-windows.rules)
 * 1:65672 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65674 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt (os-windows.rules)
 * 1:65682 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65669 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65668 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt (os-windows.rules)
 * 1:65662 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65658 <-> DISABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65681 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)
 * 1:65670 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt (os-windows.rules)
 * 1:65660 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65679 <-> ENABLED <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt (malware-tools.rules)
 * 1:65671 <-> DISABLED <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt (os-windows.rules)
 * 1:65677 <-> DISABLED <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt (server-webapp.rules)
 * 1:65659 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65666 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65665 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt (os-windows.rules)
 * 1:65661 <-> ENABLED <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt (server-webapp.rules)
 * 1:65678 <-> ENABLED <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt (server-webapp.rules)
 * 1:65680 <-> DISABLED <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:65498 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)
 * 1:65499 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt (os-windows.rules)

2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:13:21 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt


2026-01-13 18:14:37 UTC

Snort Subscriber Rules Update

Date: 2026-01-12-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301368 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager information disclosure attempt
* 1:301369 <-> OS-WINDOWS Microsoft Windows Installer elevation of privilege attempt
* 1:301370 <-> OS-WINDOWS Microsoft Windows Common Log File System Driver elevation of privilege attempt
* 1:301371 <-> OS-WINDOWS Microsoft Windows Routing and Remote Access Service elevation of privilege attempt
* 1:301372 <-> OS-WINDOWS Microsoft Windows NTFS remote code execution attempt
* 1:301373 <-> OS-WINDOWS Microsoft Windows Desktop Windows Manager elevation of privilege attempt
* 1:301374 <-> OS-WINDOWS Microsoft Windows Error Reporting Service privilege escalation attempt
* 1:65657 <-> SERVER-WEBAPP Oracle Business Intelligence BIRemotingServlet deserialization remote code execution attempt
* 1:65658 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65659 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65660 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65661 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65662 <-> SERVER-WEBAPP Apache Tika XML external entity injection attempt
* 1:65677 <-> SERVER-WEBAPP Oracle BI Publisher remote code execution attempt
* 1:65678 <-> SERVER-WEBAPP SmarterTools SmarterMail webshell upload attempt
* 1:65679 <-> MALWARE-TOOLS Unix.Trojan.ShadowV2 malicious download attempt
* 1:65680 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65681 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65682 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65683 <-> SERVER-WEBAPP Digiever DS-2105 Pro command injection attempt
* 1:65684 <-> MALWARE-CNC Multios.Trojan.BRICKSTORM variant communication attempt
* 1:65685 <-> MALWARE-CNC Win.Trojan.PureRat outbound connection attempt

Modified Rules:

* 1:301344 <-> OS-WINDOWS Microsoft Windows Ancillary Function Driver elevation of privilege attempt