Summary:
37 new OPEN, 37 new PRO (37 + 0)
Thanks @StopMalvertisin, @Jane_0sint
Added rules:
Open:
- 2046131 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046132 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046133 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046134 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046135 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046136 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046137 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046138 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046139 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046140 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046141 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046142 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046143 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046144 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046145 - ET MOBILE_MALWARE Trojan/iOS Operation Triangulation CnC Domain in DNS Lookup (mobile_malware.rules)
- 2046146 - ET MALWARE Sharp Panda APT Style RTF Request (GET) (malware.rules)
- 2046147 - ET MALWARE Sharp Panda APT RTF Retrieval (Inbound) (malware.rules)
- 2046148 - ET MALWARE Observed Sharp Panda APT Related Activity M2 (malware.rules)
- 2046149 - ET HUNTING Default Tomcat JSP web.xml Observed - Possible CVE-2020-1938 Exploit Success (hunting.rules)
- 2046150 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Activity (Screenshot) (malware.rules)
- 2046151 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Activity (System Information) (malware.rules)
- 2046152 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Activity (Check-in) (malware.rules)
- 2046153 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Activity (Activity) (malware.rules)
- 2046154 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Activity (END) (malware.rules)
- 2046155 - ET MALWARE [ANY.RUN] Win32/ObserverStealer CnC Response (malware.rules)
- 2046156 - ET MALWARE Possible MEME#4CHAN Exfil Activity (malware.rules)
- 2046157 - ET MALWARE MEME#4CHAN Redirect Activity to Payload (malware.rules)
- 2046158 - ET SCADA IEC-104 TESTFR (Test Frame) Activation (scada.rules)
- 2046159 - ET SCADA IEC-104 TESTFR (Test Frame) Confirmation (scada.rules)
- 2046160 - ET SCADA IEC-104 STARTDT (Start Data Transfer) Activation (scada.rules)
- 2046161 - ET SCADA IEC-104 STARTDT (Start Data Transfer) Confirmation (scada.rules)
- 2046162 - ET SCADA IEC-104 STOPDT (Stop Data Transfer) Activation (scada.rules)
- 2046163 - ET SCADA IEC-104 STOPDT (Stop Data Transfer) Confirmation (scada.rules)
- 2046164 - ET SCADA IEC-104 Station Interrogation - Global ASDU Broadcast (scada.rules)
- 2046165 - ET SCADA IEC-104 Clock Synchronization Command (scada.rules)
- 2046166 - ET MALWARE SocGholish Domain in DNS Lookup (illustrations .ipocla .org) (malware.rules)
- 2046167 - ET MALWARE SocGholish Domain in DNS Lookup (wholesale .surewareusa .com) (malware.rules)