'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2026-03-06 | |
| Rule Name: | Tool Havoc Detection - 2 | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Havoc is a modern open-source post-exploitation command and control (C2) framework that supports multi-platform agents, Malleable C2 communication camouflage, various Listeners such as SMB/HTTP/HTTPS, and comes with rich post-exploitation modules and plugin extensions.This rule has detected Havoc communication traffic. | |
| Impact: | Attackers use attack tools to attack targets, which can lead to data leakage, service interruption, system crash, data tampering, and illegal access. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| 1. Scan the server file system to ensure that no hacking tools and related malicious files are left. 2. Make a complete system backup to ensure the security of server data. 3. Secure the server, restrict access rights, install firewalls, and use secure access control lists. |