""ET WEB_SPECIFIC_APPS Wordpress - Successful Check for Malicious posts-layout (post-layout Doppelganger) Plugin - Infected Web Server""
SID: 2045883
Revision: 1
Class Type: web-application-activity
Metadata: affected_product Wordpress, attack_target Web_Server, created_at 2023_05_30, deployment Perimeter, deployment SSLDecrypt, performance_impact Low, confidence High, signature_severity Critical, updated_at 2023_05_30
Reference:
Protocol: tcp
Source Network: [$HOME_NET,$HTTP_SERVERS]
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: any
Flow: established,to_client
Contents:
- Value: "3ad7c2ebb96fcba7cda0cf54a2e802f5"
Within:
PCRE:
Special Options:
-
file_data
-
fast_pattern