CYBERDUDEBIVASH Wazuh Ransomware Rules — v1.1 (Linux add-on + Active Response pack)All set. Grab the new bundle with Linux detections and ready-to-wire Active Response.
What’s new in v1.1
- ✅ Linux add-on rules (IDs 881100–881109): FIM bursts, ransom-note patterns, snapshot/backup tampering, crypto/archiver misuse, history clearing, bulk chmod/chattr, rclone/mega exfil, LVM snapshot removal, SSH key access bursts.
- ✅ Active Response pack(Windows + Linux):
kill-process.ps1 / kill-process.shisolate-host.ps1 (Windows Firewall) / isolate-host.sh (iptables)
- ✅ Drop-in ossec.conf snippets to wire commands + AR triggers to our rule IDs.
Install (quick)
- Copy the two XML rules files into
/var/ossec/etc/rules.d/ (or append to local_rules.xml). - Copy scripts from
active_response/ to /var/ossec/active-response/bin/ (Linux scripts are already +x). - Merge the snippet into
/var/ossec/etc/ossec.conf under <commands> and <active-response>. - Replace the placeholder Manager IP in the isolation scripts.
- Restart Wazuh Manager/Agents.
Safety
- Test in a lab first. Start with kill-process only; enable isolation after verifying alerts to avoid disconnecting production hosts.