[***] Summary: [***] 8 new Open rules, 12 new Pro (8/4). Linksys vulns, PcClient, PCRat/Gh0st. Thanks @EKwatcher.
[+++] Added rules: [+++] Open: 2018153 - ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 27 (trojan.rules)
2018154 - ET TROJAN Win32.Hack.PcClient.g CnC (OUTBOUND) XOR b5 (trojan.rules)
2018155 - ET WORM TheMoon.linksys.router 3 (worm.rules)
2018156 - ET EXPLOIT Linksys Auth Bypass fw_sys_up.cgi (exploit.rules)
2018157 - ET EXPLOIT Linksys Auth Bypass override.cgi (exploit.rules)
2018158 - ET EXPLOIT Linksys Auth Bypass share_editor.cgi (exploit.rules)
2018159 - ET EXPLOIT Linksys Auth Bypass switch_boot.cgi (exploit.rules)
2018160 - ET EXPLOIT Linksys Failed Upgrade BackDoor Access (Server Response) (exploit.rules) Pro: 2807692 - ETPRO TROJAN Trojan.Banker.ACF Checkin (trojan.rules)
2807693 - ETPRO WORM win32.Gaobot (worm.rules)
2807694 - ETPRO TROJAN Win32/Delf.gen!A Checkin (trojan.rules)
2807695 - ETPRO TROJAN Win32/Tocoomu.A Checkin (trojan.rules)
[///] Modified active rules: [///] 2009813 - ET TROJAN Trojan.MyDNS DNSChanger - HTTP POST (trojan.rules)
2801453 - ETPRO USER_AGENTS Suspicious UA likely Banload Trojan Related (user_agents.rules)
Date: 
Monday, February 17, 2014 - 22:00