번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
11,461 | 2015/01/20 | 2014233 | ET POLICY ASafaWeb Scan User-Agent (asafaweb.com); [1] |
11,460 | 2015/01/20 | 2014232 | ET TROJAN UPDATE Protocol Trojan Communication detected on http ports 2; |
11,459 | 2015/01/20 | 2014231 | ET TROJAN UPDATE Protocol Trojan Communication detected on non-http ports 2; |
11,458 | 2015/01/20 | 2014230 | ET TROJAN Karagany/Kazy Obfuscated Payload Download; [1,2] |
11,457 | 2015/01/20 | 2014229 | ET TROJAN NfLog Checkin; [1] |
11,456 | 2015/01/20 | 2014228 | ET TROJAN Backdoor Win32.Idicaf/Atraps; [1] |
11,455 | 2015/01/20 | 2014227 | ET TROJAN BB Trojan Communication Protocol detected; [1] |
11,454 | 2015/01/20 | 2014226 | ET TROJAN IP2B Trojan Communication Protocol detected; [1] |
11,453 | 2015/01/20 | 2014225 | ET TROJAN LURK Trojan Communication Protocol detected; [1] |
11,452 | 2015/01/20 | 2014224 | ET TROJAN UPDATE Protocol Trojan Communication detected on non-http ports; [1] |
11,451 | 2015/01/20 | 2014223 | ET TROJAN UPDATE Protocol Trojan Communication detected on http ports; [1] |
11,450 | 2015/01/20 | 2014222 | ET TROJAN QDIGIT Trojan Protocol detected; [1] |
11,449 | 2015/01/20 | 2014221 | ET DELETED Unknown HTTP CnC Checkin; |
11,448 | 2015/01/20 | 2014220 | ET DELETED TDS Sutra Exploit Kit Redirect Received; |
11,447 | 2015/01/20 | 2014219 | ET TROJAN TSPY_SPCESEND.A Checkin; [1] |
11,446 | 2015/01/20 | 2014218 | ET TROJAN Zeus POST Request to CnC sk1 and bn1 post parameters; |
11,445 | 2015/01/20 | 2014217 | ET TROJAN Delf/Troxen/Zema controller delivering clickfraud instructions; |
11,444 | 2015/01/20 | 2014216 | ET TROJAN Delf/Troxen/Zema controller responding to client; |
11,443 | 2015/01/20 | 2014215 | ET MOBILE_MALWARE Android/Plankton.P Commands Request to CnC Server; [1] |
11,442 | 2015/01/20 | 2014214 | ET DELETED MSUpdater post-auth checkin; [1,2] |
11,441 | 2015/01/20 | 2014213 | ET TROJAN MSUpdater Connectivity Check to Google; [1,2] |
11,440 | 2015/01/20 | 2014212 | ET TROJAN MSUpdater POST checkin to CnC; [1,2] |
11,439 | 2015/01/20 | 2014211 | ET TROJAN MSUpdater alt checkin to CnC; [1,2] |
11,438 | 2015/01/20 | 2014210 | ET TROJAN Sykipot SSL Certificate subject emailAddress detected; [1] |
11,437 | 2015/01/20 | 2014209 | ET TROJAN Sykipot SSL Certificate serial number detected; [1] |
11,436 | 2015/01/20 | 2014208 | ET TROJAN TLD4 Purple Haze Variant Initial CnC Request for Ad Servers; [1] |
11,435 | 2015/01/20 | 2014207 | ET WEB_CLIENT Likely MS12-004 midiOutPlayNextPolyEvent Heap Overflow Midi Filename Requested baby.mid; |
11,434 | 2015/01/20 | 2014206 | ET CURRENT_EVENTS CutePack Exploit Kit Landing Page Detected; [1] |
11,433 | 2015/01/20 | 2014205 | ET CURRENT_EVENTS CUTE-IE.html CutePack Exploit Kit Iframe for Landing Page Detected; [1] |
11,432 | 2015/01/20 | 2014204 | ET CURRENT_EVENTS CutePack Exploit Kit JavaScript Variable Detected; [1] |
11,431 | 2015/01/20 | 2014203 | ET CURRENT_EVENTS CUTE-IE.html CutePack Exploit Kit Landing Page Request; [1] |
11,430 | 2015/01/20 | 2014202 | ET POLICY File Being Uploaded to SendSpace File Hosting Site; |
11,429 | 2015/01/20 | 2014201 | ET POLICY Outbound HTTP Connection From Cisco IOS Device; |
11,428 | 2015/01/20 | 2014200 | ET TROJAN Dapato/Cleaman Checkin; [1] |
11,427 | 2015/01/20 | 2014199 | ET CURRENT_EVENTS Exploit Kit Exploiting IEPeers; [1] |
11,426 | 2015/01/20 | 2014198 | ET TROJAN ZeuS - ICE-IX cid= in cookie; |
11,425 | 2015/01/20 | 2014197 | ET CURRENT_EVENTS Yang Pack Exploit Kit Landing Page Known JavaScript Function Detected; [1] |
11,424 | 2015/01/20 | 2014196 | ET DELETED Blackhole Java Exploit request to /content/rin.jar; |
11,423 | 2015/01/20 | 2014195 | ET CURRENT_EVENTS Blackhole Acrobat 8/9.3 PDF exploit download request 5; |
11,422 | 2015/01/20 | 2014194 | ET DELETED Blackhole Exploit Kit JavaScript colon string splitting; |
11,421 | 2015/01/20 | 2014193 | ET TROJAN W32/VPEYE Trojan Downloader User-Agent (VP-EYE Downloader); |
11,420 | 2015/01/20 | 2014192 | ET MALWARE W32/MediaGet Checkin; |
11,419 | 2015/01/20 | 2014191 | ET TROJAN W32/118GotYourNo Reporting to CnC; |
11,418 | 2015/01/20 | 2014190 | ET MALWARE W32/OpenTrio User-Agent (Open3); |
11,417 | 2015/01/20 | 2014189 | ET DELETED Likely Blackhole Exploit Kit Driveby ?id Download Secondary Request; |
11,416 | 2015/01/20 | 2014188 | ET WEB_SPECIFIC_APPS IBBY nouvelles.php id Parameter UPDATE SET SQL Injection Attempt; [1] |
11,415 | 2015/01/20 | 2014187 | ET WEB_SPECIFIC_APPS IBBY nouvelles.php id Parameter INSERT INTO SQL Injection Attempt; [1] |
11,414 | 2015/01/20 | 2014186 | ET WEB_SPECIFIC_APPS IBBY nouvelles.php id Parameter UNION SELECT SQL Injection Attempt; [1] |
11,413 | 2015/01/20 | 2014185 | ET WEB_SPECIFIC_APPS IBBY nouvelles.php id Parameter DELETE FROM SQL Injection Attempt; [1] |
11,412 | 2015/01/20 | 2014184 | ET WEB_SPECIFIC_APPS IBBY nouvelles.php id Parameter SELECT FROM SQL Injection Attempt; [1] |
< 311 312 313 314 315 316 317 318 319 320 > |