[***] Summary: [***]

8 new Open rules, 12 new Pro (8/4). Linksys vulns, PcClient, PCRat/Gh0st.

Thanks @EKwatcher.
[+++] Added rules: [+++]

Open:

2018153 - ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 27 (trojan.rules)
2018154 - ET TROJAN Win32.Hack.PcClient.g CnC (OUTBOUND) XOR b5 (trojan.rules)
2018155 - ET WORM TheMoon.linksys.router 3 (worm.rules)
2018156 - ET EXPLOIT Linksys Auth Bypass fw_sys_up.cgi (exploit.rules)
2018157 - ET EXPLOIT Linksys Auth Bypass override.cgi (exploit.rules)
2018158 - ET EXPLOIT Linksys Auth Bypass share_editor.cgi (exploit.rules)
2018159 - ET EXPLOIT Linksys Auth Bypass switch_boot.cgi (exploit.rules)
2018160 - ET EXPLOIT Linksys Failed Upgrade BackDoor Access (Server Response) (exploit.rules)

Pro:

2807692 - ETPRO TROJAN Trojan.Banker.ACF Checkin (trojan.rules)
2807693 - ETPRO WORM win32.Gaobot (worm.rules)
2807694 - ETPRO TROJAN Win32/Delf.gen!A Checkin (trojan.rules)
2807695 - ETPRO TROJAN Win32/Tocoomu.A Checkin (trojan.rules)
[///] Modified active rules: [///]

2009813 - ET TROJAN Trojan.MyDNS DNSChanger - HTTP POST (trojan.rules)
2801453 - ETPRO USER_AGENTS Suspicious UA likely Banload Trojan Related (user_agents.rules)

Date:
Summary title:
8 new Open rules, 12 new Pro (8/4). Linksys vulns, PcClient, PCRat/Gh0st.