IPS Signature Database Update
Name | ips.sig | |||
Version | 2.1.596 | |||
StoneOS | StoneOS 5.0R4F3.1 or above | |||
Release Date | 2025-03-03 | |||
New Signature (87) |
Rule ID | Rule Name | StonesOS | Detail |
714758 | Trojan Activity: ATTACK_RESPONSE LaZagne Artifact Outbound in FTP | 5.5R5 or above | click for more information | |
105506 | Ransomware Activity: ABUSE.CH Locky C2 Domain | 5.5R5 or above | click for more information | |
332736 | Trojan Activity: Observed Magecart CnC Domain in TLS SNI | 5.0R4 or above | click for more information | |
105540 | Ransomware Activity: DNS Query to Cerber Domain | 5.5R5 or above | click for more information | |
105545 | Ransomware Activity: DNS Query to Cerber Domain | 5.5R5 or above | click for more information | |
105501 | Ransomware Activity: Possible WannaCry DNS Lookup 3 | 5.5R5 or above | click for more information | |
105528 | Ransomware Activity: DNS Query to Cerber Domain | 5.5R5 or above | click for more information | |
332729 | Trojan Activity: Malicious SSL Cert (Magecart) | 5.5R5 or above | click for more information | |
338710 | Mingyuanyun ERP API Service.asmx SQL Injection Vulnerability | 5.0R4 or above | click for more information | |
105543 | Trojan Activity: PS/PowerRatankba CnC DNS Lookup | 5.5R5 or above | click for more information | |
338703 | Esafenet CDG MultiServerAjax SQL Injection Vulnerability | 5.5R5 or above | click for more information | |
105496 | Ransomware Activity: ABUSE.CH Ransomware Domain Detected (Locky Payment) | 5.5R5 or above | click for more information | |
105526 | Ransomware Activity: DNS Query to Cerber Domain | 5.5R5 or above | click for more information | |
105531 | Ransomware Activity: Iron Ransomware Domain | 5.5R5 or above | click for more information | |
338709 | Ruijie API auth Remote Command Execution Vulnerability | 5.5R5 or above | click for more information | |
105512 | Ransomware Activity: ABUSE.CH Ransomware/Cerber Onion Domain Lookup | 5.5R5 or above | click for more information | |
105538 | Ransomware Activity: Ransomware/Cerber Onion Domain Lookup | 5.5R5 or above | click for more information | |
105494 | Ransomware Activity: ABUSE.CH Ransomware/Cerber Onion Domain Lookup | 5.5R5 or above | click for more information | |
105499 | Ransomware Activity: Possible WannaCry DNS Lookup 1 | 5.5R5 or above | click for more information | |
105521 | Ransomware Activity: DNS Query to Cerber Domain | 5.5R5 or above | click for more information | |
...... | ||||
Updated Signature (0) |
Rule ID | Rule Name | StonesOS | Detail |
No update. | ||||