[***] Summary: [***]
7 new OPEN, 12 new PRO (7 + 5) GrandaMisha, Lazarus DNS sigs, Nagios
Command Injection Attempts, and Remcos.
Thanks @benkow_ , @h2jazi, and @ShadowChasing1
Please share issues, feedback, and requests at
https://feedback.emergingthreats.net/feedback
[+++] Added rules: [+++]
Open:
2034987 - ET POLICY Suspicious File Sharing Domain in DNS Lookup
(drive .cloudplus .one) (policy.rules)
2034988 - ET TROJAN Win32/GrandaMisha Sending System Information
(POST) (trojan.rules)
2034989 - ET TROJAN Lazarus APT Related Domain in DNS Lookup
(yourblogcenter .com) (trojan.rules)
2034990 - ET TROJAN Lazarus APT Related Domain in DNS Lookup
(allinfostudio .com) (trojan.rules)
2034991 - ET TROJAN Lazarus APT Related Domain in DNS Lookup
(docusign .agency) (trojan.rules)
2034992 - ET EXPLOIT Nagios XI OS Command Injection (CVE-2021-25296)
(exploit.rules)
2034993 - ET EXPLOIT Nagios XI OS Command Injection (CVE-2021-25297
& CVE-2021-25298) (exploit.rules)
Pro:
2850950 - ETPRO TROJAN Win32/Remcos RAT Checkin 768 (trojan.rules)
[///] Modified active rules: [///]
2032096 - ET INFO Possible Phishing Landing via MoonFruit.com (set)
(info.rules)
2849378 - ETPRO TROJAN Suspected DonotGroup Pult Downloader Activity
M2 (trojan.rules)