'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-11-18 | |
| Rule Name: | Tool PoshRat Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | PoshRat is a PowerShell-based remote access tool/backdoor framework that provides remote command execution, file transfer, session persistence, and persistence mechanisms on Windows hosts; it is commonly used by both red teams and malicious actors for remote control. This rule detects suspicious network traffic consistent with PoshRat communications. | |
| Impact: | Attackers use attack tools to attack targets, which can lead to data leakage, service interruption, system crash, data tampering, and illegal access. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| 1. Scan the server file system to ensure that no hacking tools and related malicious files are left. 2. Make a complete system backup to ensure the security of server data. 3. Secure the server, restrict access rights, install firewalls, and use secure access control lists. |