Talos Rules 2026-03-03
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-image, file-other, indicator-shellcode, malware-cnc, malware-other, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-03-03 15:16:44 UTC

Snort Subscriber Rules Update

Date: 2026-03-03

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:65997 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:65998 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:65999 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:66000 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:66001 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66002 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66003 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66004 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66005 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66006 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66007 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66008 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66009 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66010 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66011 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66012 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66013 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66014 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66015 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66016 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66017 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66018 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66019 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66020 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66021 <-> DISABLED <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt (server-webapp.rules)
 * 1:66022 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66023 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66024 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66025 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66026 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66027 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66028 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66029 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66030 <-> DISABLED <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt (server-webapp.rules)
 * 1:66031 <-> DISABLED <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt (server-webapp.rules)
 * 1:66032 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66033 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66034 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66035 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules)
 * 1:66038 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66039 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66040 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66041 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66042 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66043 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66044 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66045 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66046 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66047 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66048 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66049 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66050 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66051 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66052 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66053 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66054 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66055 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66056 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 1:66057 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 3:66036 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66037 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66058 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)
 * 3:66059 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)

Modified Rules:



2026-03-03 15:16:44 UTC

Snort Subscriber Rules Update

Date: 2026-03-03

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66042 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66043 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66057 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 1:65997 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:65998 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:65999 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:66000 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:66001 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66002 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66003 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66004 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66005 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66006 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66007 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66008 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66009 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66010 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66011 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66012 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66013 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66014 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66015 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66016 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66017 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66018 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66019 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66020 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66021 <-> DISABLED <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt (server-webapp.rules)
 * 1:66022 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66023 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66024 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66025 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66026 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66027 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66028 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66029 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66030 <-> DISABLED <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt (server-webapp.rules)
 * 1:66031 <-> DISABLED <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt (server-webapp.rules)
 * 1:66032 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66033 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66034 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66035 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules)
 * 1:66038 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66039 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66040 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66041 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66045 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66044 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66046 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66047 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66048 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66049 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66050 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66051 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66052 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66053 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66054 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66055 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66056 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 3:66036 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66037 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66058 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)
 * 3:66059 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)

Modified Rules:



2026-03-03 15:16:44 UTC

Snort Subscriber Rules Update

Date: 2026-03-03

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66044 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66045 <-> DISABLED <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt (malware-other.rules)
 * 1:66048 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66046 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66047 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt (malware-other.rules)
 * 1:66049 <-> DISABLED <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt (malware-other.rules)
 * 1:66050 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66051 <-> DISABLED <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt (malware-other.rules)
 * 1:66052 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66053 <-> DISABLED <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt (malware-other.rules)
 * 1:66054 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66055 <-> ENABLED <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication (malware-cnc.rules)
 * 1:66056 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 1:66057 <-> DISABLED <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt (server-webapp.rules)
 * 1:66034 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:65998 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:65997 <-> DISABLED <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt (malware-other.rules)
 * 1:66000 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:65999 <-> DISABLED <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt (malware-other.rules)
 * 1:66002 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66001 <-> DISABLED <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt (malware-other.rules)
 * 1:66004 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66003 <-> DISABLED <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt (malware-other.rules)
 * 1:66006 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66005 <-> DISABLED <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt (malware-other.rules)
 * 1:66007 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66009 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66008 <-> DISABLED <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt (malware-other.rules)
 * 1:66011 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66010 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt (malware-other.rules)
 * 1:66013 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66012 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt (malware-other.rules)
 * 1:66015 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66014 <-> DISABLED <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt (malware-other.rules)
 * 1:66017 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66016 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt (malware-other.rules)
 * 1:66019 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66018 <-> DISABLED <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt (server-other.rules)
 * 1:66021 <-> DISABLED <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt (server-webapp.rules)
 * 1:66020 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt (malware-other.rules)
 * 1:66023 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66022 <-> DISABLED <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt (malware-other.rules)
 * 1:66025 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66024 <-> DISABLED <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt (malware-other.rules)
 * 1:66027 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66026 <-> DISABLED <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt (malware-other.rules)
 * 1:66029 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66028 <-> DISABLED <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt (server-webapp.rules)
 * 1:66031 <-> DISABLED <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt (server-webapp.rules)
 * 1:66030 <-> DISABLED <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt (server-webapp.rules)
 * 1:66033 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66032 <-> ENABLED <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt (indicator-shellcode.rules)
 * 1:66038 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66035 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Agent variant communication (malware-cnc.rules)
 * 1:66040 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66039 <-> DISABLED <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt (server-mail.rules)
 * 1:66042 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66041 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 1:66043 <-> DISABLED <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt (malware-other.rules)
 * 3:66058 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)
 * 3:66037 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66036 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt (file-other.rules)
 * 3:66059 <-> ENABLED <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt (file-image.rules)

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:56 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:57 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules:



2026-03-03 15:19:57 UTC

Snort Subscriber Rules Update

Date: 2026-03-02-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301414 <-> MALWARE-OTHER Osx.Backdoor.Flashback.A download attempt
* 1:301415 <-> MALWARE-OTHER Vbs.Backdoor.DuCk.A download attempt
* 1:301416 <-> MALWARE-OTHER Ps1.Trojan.PowerWare.A download attempt
* 1:301417 <-> MALWARE-OTHER Win.Downloader.Maduniks.A download attempt
* 1:301418 <-> MALWARE-OTHER Win.Worm.Recusenu.A download attempt
* 1:301419 <-> MALWARE-OTHER Perl.Backdoor.Sabrienbot.A download attempt
* 1:301420 <-> MALWARE-OTHER Unix.Trojan.SilentStage variant download attempt
* 1:301421 <-> MALWARE-OTHER Unix.Trojan.IcyBind variant download attempt
* 1:301422 <-> MALWARE-OTHER Unix.Trojan.ColdStart variant download attempt
* 1:301423 <-> MALWARE-OTHER Win.Backdoor.ShellReset.A download attempt
* 1:301424 <-> SERVER-OTHER OpenSSL CMS AuthEnvelopedData buffer overflow attempt
* 1:301425 <-> MALWARE-OTHER Js.Trojan.Seemeerat.A download attempt
* 1:301426 <-> MALWARE-OTHER Win.Trojan.ITroublveTSC.A download attempt
* 1:301427 <-> MALWARE-OTHER Win.Backdoor.Netero.A download attempt
* 1:301428 <-> MALWARE-OTHER Js.Trojan.QNodeService.A download attempt
* 1:301429 <-> SERVER-WEBAPP SolarWinds Network Performance Monitor insecure deserialization attempt
* 1:301430 <-> SERVER-MAIL RoundCube Webmail SVG cross site scripting attempt
* 1:301431 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301432 <-> MALWARE-OTHER Win.Loader.SNOWLIGHT variant download attempt
* 1:301433 <-> MALWARE-OTHER Win.Loader.LexiCrypt variant download attempt
* 1:301434 <-> MALWARE-OTHER Win.Trojan.NetDraft variant download attempt
* 1:301435 <-> MALWARE-OTHER Win.Loader.DeedRat variant download attempt
* 1:301436 <-> MALWARE-OTHER Win.Loader.Draculoader variant download attempt
* 1:301437 <-> MALWARE-OTHER Win.Loader.CloudSorcerer variant download attempt
* 1:66021 <-> SERVER-WEBAPP PaperCut NG and NF PrintDeployProxyController directory traversal attempt
* 1:66030 <-> SERVER-WEBAPP Advantech R-SeeNet local file inclusion attempt
* 1:66031 <-> SERVER-WEBAPP ParisNeo LoLLMS WebUI directory traversal attempt
* 1:66032 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66033 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66034 <-> INDICATOR-SHELLCODE GWT-RPC ysoserial Java object deserialization exploit attempt
* 1:66035 <-> MALWARE-CNC Win.Trojan.Agent variant communication
* 1:66054 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66055 <-> MALWARE-CNC Win.Loader.SNOWLIGHT variant communication
* 1:66056 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 1:66057 <-> SERVER-WEBAPP TP-LINK Archer AX Series Router CWMP memory corruption attempt
* 3:66036 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66037 <-> FILE-OTHER TRUFFLEHUNTER TALOS-2026-2362 attack attempt
* 3:66058 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt
* 3:66059 <-> FILE-IMAGE TRUFFLEHUNTER TALOS-2026-2358 attack attempt

Modified Rules: