[***] Summary: [***]

6 new OPEN, 8 new PRO (6 + 2)

Thanks @suyog41

Note: There will be no release on 12/26 due to observance of holidays.
For normalization purposes, we have changed the metadata tag
affected_product for Exchange from "MS_Exchange" to read
"Microsoft_Exchange".

The Emerging Threats mailing list is migrating to Discourse. Please
visit us at https://community.emergingthreats.net

We will announce the mailing list retirement date in the near future.

[+++] Added rules: [+++]

Open:

2043002 - ET EXPLOIT Microsoft Exchange Remote Code Execution Attempt
- OWASSRF (CVE-2022-41040, CVE-2022-41082) (exploit.rules)
2043003 - ET MALWARE Win32/RecordBreaker - Observed UA M5 (23591)
(malware.rules)
2043004 - ET MALWARE SocGholish Domain in DNS Lookup (perspective
.abcbarbecue .xyz) (malware.rules)
2043005 - ET MALWARE SocGholish Domain in DNS Lookup (exclusive
.milonopensky .store) (malware.rules)
2043006 - ET MALWARE SocGholish Domain in DNS Lookup (extcourse
.zurvio .com) (malware.rules)
2043007 - ET MALWARE SocGholish Domain in DNS Lookup (internship
.ojul .com) (malware.rules)

Pro:

2852980 - ETPRO MALWARE Win32/Fabookie.ek CnC Request M1 (GET) (malware.rules)
2852981 - ETPRO MALWARE Win32/Fabookie.ek CnC Request M3 (GET) (malware.rules)

[///] Modified active rules: [///]

2032897 - ET EXPLOIT Microsoft Exchange RCE Setup Inbound
(CVE-2021-28482) (exploit.rules)
2033681 - ET EXPLOIT Microsoft Exchange Pre-Auth Path Confusion M1
(CVE-2021-31207) (exploit.rules)
2033682 - ET EXPLOIT Microsoft Exchange Pre-Auth Path Confusion M2
(CVE-2021-31207) (exploit.rules)
2033683 - ET EXPLOIT Vulnerable Microsoft Exchange Server Response
(CVE-2021-31207) (exploit.rules)
2033684 - ET EXPLOIT Possible Microsoft Exchange RCE Inbound M1
(CVE-2021-34473) (exploit.rules)
2033701 - ET EXPLOIT Microsoft Exchange SUID Disclosure via SSRF
Inbound M1 (CVE-2021-31207) (exploit.rules)
2033711 - ET EXPLOIT Possible Microsoft Exchange RCE Inbound M2
(CVE-2021-34473) (exploit.rules)
2033712 - ET EXPLOIT Possible Microsoft Exchange RCE with Python PSRP
Client UA Inbound (CVE-2021-34473) (exploit.rules)
2035648 - ET EXPLOIT Microsoft Exchange SUID Disclosure via SSRF
Inbound M2 (CVE-2021-31207) (exploit.rules)
2035649 - ET EXPLOIT Possible Microsoft Exchange RCE Inbound M3
(CVE-2021-34473) (exploit.rules)
2035650 - ET EXPLOIT Possible Microsoft Exchange Mailbox Enumeration
Inbound (CVE-2021-34473) (exploit.rules)
2039065 - ET EXPLOIT Microsoft Exchange Remote Code Execution Attempt
(CVE-2022-41040, CVE-2022-41082) (exploit.rules)

[---] Disabled and modified rules: [---]

2038949 - ET MALWARE SocGholish Domain in DNS Lookup (predator
.foxscalesjewelry .com) (malware.rules)
2039139 - ET MALWARE SocGholish Domain in DNS Lookup (ecar
.allsunstates .com) (malware.rules)
2039838 - ET MALWARE SocGholish Domain in DNS Lookup (hook .adieh
.com) (malware.rules)

---------------------------------------------------------

Date:
Summary title:
6 new OPEN, 8 new PRO (6 + 2)