Snort rule update for Oct. 1, 2020

A new SNORTⓇ rule release is available this morning, courtesy of Cisco Talos. Here's an overview at this rule set:

.tg {border-collapse:collapse;border-spacing:0;} .tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px; overflow:hidden;padding:10px 5px;word-break:normal;} .tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px; font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;} .tg .tg-6p4y{border-color:#efefef;font-weight:bold;text-align:left;vertical-align:top} .tg .tg-ly6r{border-color:#efefef;text-align:left;vertical-align:top}

Shared object rules Modified shared object rules New rules Modified rules
0 0 17 9

Thursday's release provides new rules protecting against several malware families, including the Razy trojan and the Gamarue botnet.


There were no changes made to the snort.conf in this release.
Talos's rule release: 
Talos has added and modified multiple rules in the malware-backdoor, malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
You can subscribe to Talos' newest rule detection functionality for as low as $29 a year with a personal account. Be sure and see our business pricing as well here. Make sure and stay up to date to catch the most emerging threats.