RIG.Exploit.Kit

description-logoDescription

This indicates an attack attempt to exploit a system through the RIG Exploit Kit.
The RIG Exploit Kit attempts to compromise a system through various software vulnerabilities.

affected-products-logoAffected Products

RIG Exploit Kit

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Monitor the traffic from that network for any suspicious activity.
Update systems and applications to the latest version.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-03-23 18.043 Sig Added
2021-01-14 17.000 Sig Added
2021-01-14 16.999 Sig Added
2021-01-14 16.998 Sig Added
2020-12-15 16.980 Sig Added
2020-09-29 16.933 Sig Added
2020-09-24 16.932 Sig Added
2020-05-06 15.838 Sig Added
2020-05-06 15.836 Sig Added
2020-02-24 15.782 Sig Added