Summary:
14 new OPEN, 19 new PRO (14 + 5)
Thanks @suyog41
Added rules:
Open:
- 2068711 - ET EXPLOIT_KIT LandUpdate808 Domain in DNS Lookup (windlrr .com) (exploit_kit.rules)
- 2068795 - ET INFO DYNAMIC_DNS Query to a *.isfacat .net domain (info.rules)
- 2068796 - ET INFO DYNAMIC_DNS HTTP Request to a *.isfacat .net domain (info.rules)
- 2068797 - ET INFO DYNAMIC_DNS Query to a *.gandurlogistics .com domain (info.rules)
- 2068798 - ET INFO DYNAMIC_DNS HTTP Request to a *.gandurlogistics .com domain (info.rules)
- 2068799 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (knowale .cyou) (malware.rules)
- 2068800 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (knowale .cyou) in TLS SNI (malware.rules)
- 2068801 - ET WEB_SPECIFIC_APPS Dolibarr ERP/CRM societe_extrafields.php dol_eval Allow List Bypass via computed_value Parameter (CVE-2026-22666) (web_specific_apps.rules)
- 2068802 - ET WEB_SPECIFIC_APPS SmarterTools SmarterMail ConnectToHub Remote Code Execution (CVE-2026-24423) (web_specific_apps.rules)
- 2068803 - ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (crypta-wave .top) (exploit_kit.rules)
- 2068804 - ET EXPLOIT_KIT ZPHP Domain in TLS SNI (crypta-wave .top) (exploit_kit.rules)
- 2068805 - ET MALWARE COMSUON Stealer Exfil via Telegram (malware.rules)
- 2068806 - ET WEB_SPECIFIC_APPS Fortinet FortiSandbox Unauthenticated Remote Code Execution (CVE-2026-39808) (web_specific_apps.rules)
- 2068807 - ET HUNTING Fake Windows Powershell User-Agent Observed (powershell) (hunting.rules)
Pro:
- 2867079 - ETPRO MALWARE SesameStealer User-Agent Observed (malware.rules)
- 2867080 - ETPRO MALWARE SesameStealer CnC Beacon (GET) (malware.rules)
- 2867081 - ETPRO MALWARE DonutLoader Requesting Additional Payload (malware.rules)
- 2867082 - ETPRO MALWARE Observed DNS Query to SesameStealer Domain (malware.rules)
- 2867083 - ETPRO MALWARE Observed SesameStealer Domain in TLS SNI (malware.rules)
Disabled and modified rules:
- 2866984 - ETPRO MALWARE TA584 Win32/XWorm V2 CnC Command - PING Outbound (malware.rules)
- 2866988 - ETPRO MALWARE TA584 Win32/XWorm CnC Command - Ping Inbound (malware.rules)
- 2866993 - ETPRO MALWARE TA584 Win32/XWorm V2 CnC Command - RD- Inbound (malware.rules)
- 2866998 - ETPRO MALWARE TA584 Win32/XWorm V3 CnC Command - GetInformations Inbound (malware.rules)
- 2867000 - ETPRO MALWARE TA584 Win32/XWorm V3 CnC Command - PCShutdown Inbound (malware.rules)
Removed rules:
- 2068711 - ET MALWARE XorBee RAT CnC Domain in DNS Lookup (windlrr .com) (malware.rules)