The latest release includes 26 new rules and more than 1,000 modified rules.
Today's release provides new coverage for the Ursnif malware family, which was recently spotted in the wild using COVID-19-themed lure documents. There are also new rules that detect common PowerShell techniques used by the Cobalt Strike family.
There were no changes made to the snort.conf in this release.
Talos's rule release:
Talos has added and modified multiple rules in the app-detect, browser-ie, browser-other, browser-webkit, exploit-kit, file-flash, file-identify, file-multimedia, file-office, file-other, file-pdf, indicator-compromise, malware-backdoor, malware-cnc, malware-other, malware-tools, netbios, os-mobile, os-windows, policy-other, protocol-imap, protocol-other, protocol-pop, protocol-telnet, protocol-voip, pua-adware, pua-other, pua-toolbars, server-mail, server-mysql, server-oracle, server-other and sql rule sets to provide coverage for emerging threats from these technologies.You can subscribe to Talos' newest rule detection functionality for as low as $29 a year with a personal account. Be sure and see our business pricing as well here. Make sure and stay up to date to catch the most emerging threats.