RIG.Exploit.Kit
Description
This indicates an attack attempt to exploit a system through the RIG Exploit Kit.
The RIG Exploit Kit attempts to compromise a system through various software vulnerabilities.
Affected Products
RIG Exploit Kit
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Monitor the traffic from that network for any suspicious activity.
Update systems and applications to the latest version.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-03-23 | 18.043 | Sig Added |
2021-01-14 | 17.000 | Sig Added |
2021-01-14 | 16.999 | Sig Added |
2021-01-14 | 16.998 | Sig Added |
2020-12-15 | 16.980 | Sig Added |
2020-09-29 | 16.933 | Sig Added |
2020-09-24 | 16.932 | Sig Added |
2020-05-06 | 15.838 | Sig Added |
2020-05-06 | 15.836 | Sig Added |
2020-02-24 | 15.782 | Sig Added |