""ET WEB_SPECIFIC_APPS Wordpress - Successful Check for Malicious posts-layout (post-layout Doppelganger) Plugin - Infected Web Server""

SID: 2045883

Revision: 1

Class Type: web-application-activity

Metadata: affected_product Wordpress, attack_target Web_Server, created_at 2023_05_30, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Critical, updated_at 2023_05_30

Reference:

Protocol: tcp

Source Network: [$HOME_NET,$HTTP_SERVERS]

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "3ad7c2ebb96fcba7cda0cf54a2e802f5"

Within:

PCRE:

Special Options:

  • file_data

  • fast_pattern

source