IPS Threat Content Update Release Notes 23.134.17

IPS Threat Content Update Release Notes 23.134.17

Refer to the following summary of signatures deployed on August 30, 2023 with the IPS content release:

  • Signatures added: 49
  • Signatures modified: 3
  • Signatures removed: 4

Signatures Added

SIDDescriptionReferences
150650MALWARE-CNC ANGLER.EK.JS.Exploit traffic detectedno reference
150652MALWARE-CNC FALLOUT.EK.Generic traffic detectedNo reference
150653MALWARE-CNC EMOTET.Trickbot.C2 traffic detectedno reference
150654MALWARE-CNC Brute.Ratel.Generic traffic detectedno reference
150655MALWARE-CNC Bumblebee.Generic.Get traffic detectedno reference
150656MALWARE-CNC QakBot.Generic.Post traffic detectedNo reference
150657MALWARE-CNC QakBot.Generic.Get traffic detectedno reference
160118FILE-PDF Adobe Acrobat Use-After-Free read attemptCVE-2023-29303
160119FILE-PDF Adobe Acrobat out-of-bound read attemptCVE-2023-38223
160120FILE-PDF Adobe Acrobat Use-After-Free read attemptCVE-2023-38222
160121FILE-PDF Adobe Acrobat Use-After-Free read attemptCVE-2023-38227
160122FILE-PDF Adobe Acrobat Use-After-Free read attemptCVE-2023-38230
160123FILE-PDF Adobe Acrobat out-of-bound write attemptCVE-2023-38231
160124FILE-PDF Adobe Acrobat out-of-bound read attemptCVE-2023-38226
160125FILE-PDF Adobe Acrobat out-of-bound read attemptCVE-2023-38242
160126FILE-PDF Adobe Acrobat out-of-bound read attemptCVE-2023-38248
160127FILE-PDF Adobe Acrobat out-of-bound write attemptCVE-2023-38233
160128FILE-PDF Adobe Acrobat out-of-bound read attemptCVE-2023-38239
62196MALWARE-OTHER Win.Ransomware.Halo variant download attemptno reference
62198FILE-OTHER AMD Zen 2 VZEROUPPER instruction register File State leak attemptCVE-2023-20593
62221MALWARE-OTHER Win.Infostealer.Invicta variant download attemptsentinelone.com/blog/rhysida-ransomware-raas-crawls-out-of-crimeware-undergrowth-to-attack-chilean-army
62223MALWARE-OTHER Win.Trojan.Rhysida variant download attemptsentinelone.com/blog/rhysida-ransomware-raas-crawls-out-of-crimeware-undergrowth-to-attack-chilean-army
62225MALWARE-OTHER Win.Trojan.Rhysida variant download attemptsentinelone.com/blog/rhysida-ransomware-raas-crawls-out-of-crimeware-undergrowth-to-attack-chilean-army
62229MALWARE-OTHER Win.Ransomware.Rhysida variant download attemptsentinelone.com/blog/rhysida-ransomware-raas-crawls-out-of-crimeware-undergrowth-to-attack-chilean-army
62233MALWARE-OTHER Win.Ransomware.BigHead variant download attempttrendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html
62235MALWARE-OTHER Win.Ransomware.BigHead variant download attempttrendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html
62237MALWARE-OTHER Win.Ransomware.BigHead variant download attempttrendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html
62239MALWARE-OTHER Win.Ransomware.BigHead variant download attempttrendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html
62244MALWARE-CNC Win.Malware.SapphireStealer variant outbound connectiongithub.com/0day2/sapphirestealer/
62245MALWARE-CNC Win.Malware.SapphireStealer variant outbound connectiongithub.com/0day2/sapphirestealer/
62246MALWARE-CNC Win.Malware.SapphireStealer variant outbound connectiongithub.com/0day2/sapphirestealer/
62247MALWARE-CNC Win.Malware.SapphireStealer variant outbound connectiongithub.com/0day2/sapphirestealer/
62248MALWARE-CNC Win.Malware.QuiteRAT variant outbound connection attemptblog.talosintelligence.com/lazarus-three-rats/
62252MALWARE-OTHER Andr.Trojan.Bahamut variant download attemptvirustotal.com/gui/file/8a35d0b20b6f057fe42e606a124cb84d78fa95900a16b056269f1cc613853989
62253MALWARE-CNC Win.Malware.Lazarus variant outbound connection attemptmedium.com/@dcso_cytec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
62254MALWARE-CNC Win.Malware.Lazarus variant outbound connection attemptmedium.com/@dcso_cytec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
62255MALWARE-CNC Win.Malware.Lazarus variant outbound connection attemptmedium.com/@dcso_cytec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
62260POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attemptCVE-2023-35081
62261POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attemptCVE-2023-35081
62262POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attemptCVE-2023-35081
62263POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attemptCVE-2023-35081
62265POLICY-OTHER HTML Sanitizer cross site scripting attemptCVE-2021-42575
62284FILE-OTHER XSLT Java code execution attemptCVE-2023-26119
62287OS-WINDOWS Microsoft Windows kernel elevation of privilege attemptCVE-2022-21881
62290MALWARE-OTHER Win.Backdoor.Gootloader variant download attemptno reference
62292OS-WINDOWS Microsoft Windows NPFS file system privilege escalation attemptCVE-2022-22715
62293OS-WINDOWS Microsoft Windows NPFS file system privilege escalation attemptCVE-2022-22715
62298MALWARE-CNC Win.Malware.DarkGate outbound connection attempt0xtoxin.github.io/threat%20breakdown/darkgate-camapign-analysis/
62302FILE-OFFICE Microsoft Office Excel RealTimeData record heap memory corruption attemptCVE-2010-1247

Signatures Removed

Following signatures are removed due to FP:

SIDS Removed – 25636, 40123, 46942, and 150202.

Share this Doc

IPS Threat Content Update Release Notes 23.134.17

Or copy link

In this topic ...