Cisco Talos Update for FireSIGHT Management Center

Date: 2019-06-13

This SRU number: 2019-06-13-001
Previous SRU number: 2019-06-10-001

Applies to:

This SEU number: 2033
Previous SEU: 2031

Applies to:

This is the complete list of rules added in SRU 2019-06-13-001 and SEU 2033.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Cisco Talos policy, Connectivity, Balanced, Security, and Maximum Detection.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.Max.
150416MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150417MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150418MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150419MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150420MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150421MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150422MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150423MALWARE-CNCWin.Trojan.OceanLotus variant download attemptoffdropdropdrop
150424MALWARE-CNCUser-Agent known malicious user agent - BURAN - Win.Trojan.Buranoffdropdropdrop
150425MALWARE-CNCWin.Trojan.Buran malicious Buran ransomware download attemptoffdropdropdrop
150426MALWARE-CNCWin.Trojan.Buran malicious Buran ransomware download attemptoffdropdropdrop
350427SERVER-WEBAPPCisco IOS XE Web UI cross site request forgery attemptoffoffdropdrop
150428SERVER-WEBAPPOracle WebLogic Server authenticated arbitrary JSP file upload attemptoffoffdropdrop
150429MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150430MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150431MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150432MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150433MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150434MALWARE-CNCAndr.Spyware.Reptilicus variant post-compromise outbound connection detectedoffdropdropdrop
150435MALWARE-CNCAndr.Spyware.iSpyoo variant post-compromise outbound connectionoffdropdropdrop
150436MALWARE-CNCAndr.Spyware.iSpyoo variant post-compromise outbound connectionoffdropdropdrop
150437MALWARE-CNCAndr.Spyware.iSpyoo variant post-compromise outbound connectionoffdropdropdrop
150438MALWARE-CNCAndr.Spyware.iSpyoo variant post-compromise outbound connectionoffdropdropdrop
150439MALWARE-CNCAndr.Spyware.iSpyoo variant post-compromise outbound connectionoffdropdropdrop
150440MALWARE-CNCWin.Malware.Ramnit inbound VERIFY_HOST responseoffdropdropdrop
150441FILE-IMAGEAdobe Acrobat TIFF heap buffer overflow attemptoffoffoffoff
150442FILE-IMAGEAdobe Acrobat TIFF heap buffer overflow attemptoffoffoffoff
150443FILE-IMAGEAdobe Acrobat TIFF heap buffer overflow attemptoffoffoffoff
150444FILE-IMAGEAdobe Acrobat TIFF heap buffer overflow attemptoffoffoffoff
150445MALWARE-CNCWin.Downloader.TeamBot additional payload download attemptoffdropdropdrop
150446MALWARE-CNCWin.Downloader.TeamBot outbound cnc connectionoffdropdropdrop