Summary:
3 new OPEN, 4 new PRO (3 + 1)
Added rules:
Open:
- 2066456 - ET WEB_SPECIFIC_APPS Omnissa Workspace One Path Traversal (CVE-2025-25231) (web_specific_apps.rules)
- 2066457 - ET MALWARE Observed DNS Query to Salat Stealer Domain (salat .cn) (malware.rules)
- 2066458 - ET MALWARE Observed Salat Stealer Domain (salat .cn in TLS SNI) (malware.rules)
Pro:
- 2865493 - ETPRO EXPLOIT WatchGuard Firebox Unauthenticated IKEv2 Remote Code Execution (CVE-2025-14733) (exploit.rules)
Modified inactive rules:
- 2000049 - ET EXPLOIT CVS server heap overflow attempt (target Solaris) (exploit.rules)
- 2001016 - ET ADWARE_PUP SideStep Bar Install (adware_pup.rules)
- 2002406 - ET EXPLOIT TAC Attack Directory Traversal (exploit.rules)
- 2003536 - ET ATTACK_RESPONSE r57 phpshell source being uploaded (attack_response.rules)
- 2007986 - ET MALWARE Emogen Reporting via HTTP (malware.rules)
- 2010500 - ET ADWARE_PUP Executable purporting to be .txt file with no Referer - Likely Malware (adware_pup.rules)
- 2010821 - ET MALWARE Java Downloader likely malicious payload download src=xrun (malware.rules)
- 2023294 - ET MALWARE ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Gozi MITM) (malware.rules)
- 2023342 - ET MALWARE Malicious SSL certificate detected (Powershell Trojan) (malware.rules)
- 2024068 - ET MALWARE ABUSE.CH SSL Fingerprint Blacklist Malicious SSL Certificate Detected (Gozi MITM) (malware.rules)
- 2815840 - ETPRO MALWARE VirdetDoor Init (malware.rules)