Talos has added and modified multiple rules in the malware-cnc, malware-other, protocol-snmp and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:65849 <-> ENABLED <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt (server-other.rules) * 1:65852 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65853 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65854 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65855 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65856 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65857 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65859 <-> DISABLED <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication (malware-cnc.rules) * 1:65831 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65832 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65833 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65834 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65835 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65836 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65837 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65838 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65839 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65840 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65841 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65842 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65843 <-> DISABLED <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt (server-webapp.rules) * 1:65844 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65845 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65846 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 3:65847 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules) * 3:65848 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules) * 3:65851 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65850 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65858 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt (server-webapp.rules) * 3:65860 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt (server-webapp.rules) * 3:65861 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt (server-webapp.rules) * 3:65862 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt (server-webapp.rules) * 3:65863 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt (server-webapp.rules)
* 1:1412 <-> DISABLED <-> PROTOCOL-SNMP public access tcp (protocol-snmp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:65839 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65840 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65842 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65841 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65857 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65859 <-> DISABLED <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication (malware-cnc.rules) * 1:65831 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65856 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65833 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65832 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65838 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65855 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65843 <-> DISABLED <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt (server-webapp.rules) * 1:65837 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65836 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65844 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65845 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65846 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65849 <-> ENABLED <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt (server-other.rules) * 1:65852 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65853 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65854 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65835 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65834 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 3:65863 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt (server-webapp.rules) * 3:65848 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules) * 3:65858 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt (server-webapp.rules) * 3:65860 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt (server-webapp.rules) * 3:65861 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt (server-webapp.rules) * 3:65850 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65851 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65847 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules) * 3:65862 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt (server-webapp.rules)
* 1:1412 <-> DISABLED <-> PROTOCOL-SNMP public access tcp (protocol-snmp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:65832 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65833 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65852 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65840 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65839 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65842 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65843 <-> DISABLED <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt (server-webapp.rules) * 1:65845 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65844 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65849 <-> ENABLED <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt (server-other.rules) * 1:65846 <-> DISABLED <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt (server-webapp.rules) * 1:65834 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65854 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65853 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt (malware-other.rules) * 1:65855 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65857 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65841 <-> ENABLED <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt (malware-other.rules) * 1:65859 <-> DISABLED <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication (malware-cnc.rules) * 1:65831 <-> DISABLED <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt (server-webapp.rules) * 1:65856 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt (malware-other.rules) * 1:65836 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65837 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65838 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 1:65835 <-> ENABLED <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt (malware-cnc.rules) * 3:65850 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65851 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt (server-webapp.rules) * 3:65848 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules) * 3:65858 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt (server-webapp.rules) * 3:65861 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt (server-webapp.rules) * 3:65860 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt (server-webapp.rules) * 3:65863 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt (server-webapp.rules) * 3:65862 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt (server-webapp.rules) * 3:65847 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt (server-webapp.rules)
* 1:1412 <-> DISABLED <-> PROTOCOL-SNMP public access tcp (protocol-snmp.rules)
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp
This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.
The format of the file is:
gid:sid <-> Message
* 1:301388 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301389 <-> MALWARE-OTHER Unix.Trojan.VoidLink variant download attempt * 1:301390 <-> MALWARE-OTHER Win.Trojan.Agent variant download attempt * 1:301391 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:301392 <-> MALWARE-OTHER Ps1.Trojan.Agent variant download attempt * 1:65831 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65832 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65833 <-> SERVER-WEBAPP Cacti automation_graph_rules.php SQL injection attempt * 1:65834 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65835 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65836 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65837 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65838 <-> MALWARE-CNC Unix.Trojan.VoidLink variant communication attempt * 1:65843 <-> SERVER-WEBAPP Apache SkyWalking graphql SQL injection attempt * 1:65844 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65845 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65846 <-> SERVER-WEBAPP Cacti /cacti/tree.php SQL injection attempt * 1:65849 <-> SERVER-OTHER Fortinet FortiSIEM phMonitor argument injection attempt * 1:65859 <-> MALWARE-CNC Win.Trojan.HttpTroy variant outbound communication * 3:65847 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65848 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2343 attack attempt * 3:65850 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65851 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2337 attack attempt * 3:65858 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2345 attack attempt * 3:65860 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2346 attack attempt * 3:65861 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2347 attack attempt * 3:65862 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2354 attack attempt * 3:65863 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2026-2356 attack attempt
* 1:1412 <-> PROTOCOL-SNMP public access tcp