alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT IoT? IPCamera Exploit Attempt Inbound"; flow:established,to_server; content:"POST"; http_method; content:"/sysTimeCfgEx"; http_uri; fast_pattern; isdataat:!1,relative; content:"systemdate="; http_client_body; depth:11; nocase; content:"&systemtime="; http_client_body; nocase; content:"&dwTimeZone"; http_client_body; nocase; content:"&updatemode="; http_client_body; nocase; content:"&ntpHost="; http_client_body; nocase; content:"&ntpPort="; http_client_body; nocase; content:"&timezonecon="; http_client_body; nocase; http_header_names; content:!"Referer"; metadata: former_category EXPLOIT; reference:url,twitter.com/zom3y3/status/1115481065701830657/photo/1; classtype:trojan-activity; sid:2027194; rev:2; metadata:attack_target Client_Endpoint, deployment Perimeter, signature_severity Major, created_at 2019_04_12, malware_family Mirai, performance_impact Moderate, updated_at 2019_04_12;)

Added 2019-04-12 18:46:10 UTC


Topic revision: r1 - 2019-04-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats