SNORTⓇ's latest rule release is here, courtesy of Cisco Talos.
Thursday's rule release includes several new rules to defend against the DarkSide ransomware. These rules will specifically detect any usage of a custom command and control framework the ransomware's been known to utilize.
Here's a full breakdown of this release:
Shared object rules | Modified shared object rules | New rules | Modified rules |
---|---|---|---|
14 | 0 | 8 | 0 |
snort.conf
in this release.Talos' rule release:
Talos has added and modified multiple rules in the malware-cnc, malware-other, os-other, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.