번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
12,061 | 2015/01/20 | 2014872 | ET TROJAN Self Signed SSL Certificate (John Doe); |
12,060 | 2015/01/20 | 2014871 | ET TROJAN Self Signed SSL Certificate (Reaserch); |
12,059 | 2015/01/20 | 2014870 | ET CURRENT_EVENTS SN and CN From MS TS Revoked Cert Chain Seen; [1,2,3] |
12,058 | 2015/01/20 | 2014869 | ET SCAN Arachni Scanner Web Scan; [1,2] |
12,057 | 2015/01/20 | 2014868 | ET INFO DYNAMIC_DNS Query to dns-stuff.com Domain *.dns-stuff.com; |
12,056 | 2015/01/20 | 2014867 | ET INFO DYNAMIC_DNS HTTP Request to a dns-stuff.com Domain *.dns-stuff.com; |
12,055 | 2015/01/20 | 2014866 | ET CURRENT_EVENTS Redirect to driveby sid=mix; |
12,054 | 2015/01/20 | 2014865 | ET WEB_CLIENT MP4 Embedded in PDF File - Potential Flash Exploit; [1] |
12,053 | 2015/01/20 | 2014864 | ET TROJAN W32.Gimemo/Aldibot CnC POST; [1] |
12,052 | 2015/01/20 | 2014863 | ET DELETED W32.Tinba/Zusy Banking Trojan Hardcoded CnC Domain Request - d4ak4otavolandos.com; [1] |
12,051 | 2015/01/20 | 2014862 | ET DELETED W32.Tinba/Zusy Banking Trojan Hardcoded CnC Domain Request - d3akotav33olandos.com; [1] |
12,050 | 2015/01/20 | 2014861 | ET DELETED W32.Tinba/Zusy Banking Trojan Hardcoded CnC Domain Request - dako22tavol2andos.com; [1] |
12,049 | 2015/01/20 | 2014860 | ET DELETED W32.Tinba/Zusy Banking Trojan Hardcoded CnC Domain Request - dak1otavola1ndos.com; [1] |
12,048 | 2015/01/20 | 2014859 | ET DELETED W32.Tinba/Zusy Banking Trojan Hardcoded CnC Domain Request - dakotavolandos.com; [1] |
12,047 | 2015/01/20 | 2014858 | ET CURRENT_EVENTS Blackhole Fraudulent Paypal Mailing Server Response June 04 2012; |
12,046 | 2015/01/20 | 2014857 | ET TROJAN FakeAvCn-A Checkin 3; |
12,045 | 2015/01/20 | 2014856 | ET TROJAN FakeAvCn-A Checkin 2; |
12,044 | 2015/01/20 | 2014855 | ET TROJAN FakeAvCn-A Checkin 1; |
12,043 | 2015/01/20 | 2014854 | ET CURRENT_EVENTS Likely TDS redirecting to exploit kit; |
12,042 | 2015/01/20 | 2014853 | ET CURRENT_EVENTS Sakura Exploit Kit Version 1.1 Applet Value lxxt; [1] |
12,041 | 2015/01/20 | 2014852 | ET CURRENT_EVENTS Possible Sakura Exploit Kit Version 1.1 document.write Fake 404 - Landing Page; [1] |
12,040 | 2015/01/20 | 2014851 | ET CURRENT_EVENTS Sakura Exploit Kit Version 1.1 Archive Request; [1] |
12,039 | 2015/01/20 | 2014850 | ET TROJAN Flamer WuSetupV module traffic 2; |
12,038 | 2015/01/20 | 2014849 | ET TROJAN Flamer WuSetupV module traffic 1; |
12,037 | 2015/01/20 | 2014848 | ET CURRENT_EVENTS webshell used In timthumb attacks GIF98a 16129xX with PHP; [1] |
12,036 | 2015/01/20 | 2014847 | ET CURRENT_EVENTS php with eval/gzinflate/base64_decode possible webshell; [1] |
12,035 | 2015/01/20 | 2014846 | ET CURRENT_EVENTS Wordpress timthumb look-alike domain list RFI; [1] |
12,034 | 2015/01/20 | 2014845 | ET DELETED Probable Golfhole exploit kit binary download #2; |
12,033 | 2015/01/20 | 2014844 | ET DELETED Probable Golfhole exploit kit landing page #2; |
12,032 | 2015/01/20 | 2014843 | ET TROJAN Blackhole Exploit Kit Request tkr; |
12,031 | 2015/01/20 | 2014842 | ET TROJAN Blackhole Loading Gif Inline Image; |
12,030 | 2015/01/20 | 2014841 | ET TROJAN Possible Feodo/Cridex Traffic Detected; |
12,029 | 2015/01/20 | 2014840 | ET WEB_SPECIFIC_APPS Exponent file parameter Local File Inclusion Attempt; [1] |
12,028 | 2015/01/20 | 2014839 | ET WEB_SPECIFIC_APPS WordPress PDF and Print Button Joliprint plugin opt parameter Cross-Site Scripting Attempt; [1] |
12,027 | 2015/01/20 | 2014838 | ET WEB_SPECIFIC_APPS WordPress PDF and Print Button Joliprint plugin type parameter Cross-Site Scripting Attempt; [1] |
12,026 | 2015/01/20 | 2014837 | ET WEB_SPECIFIC_APPS Joomla Jotloader component section parameter Local File Inclusion Attempt; [1] |
12,025 | 2015/01/20 | 2014836 | ET WEB_SPECIFIC_APPS DynPG CMS PathToRoot Parameter Remote File inclusion Attempt; [1] |
12,024 | 2015/01/20 | 2014835 | ET ACTIVEX Possible SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control Install3rdPartyComponent Method Buffer Overflow; [1] |
12,023 | 2015/01/20 | 2014834 | ET ACTIVEX Possible LEADTOOLS ActiveX Raster Twain AppName Method Access Buffer Overflow 2; [1] |
12,022 | 2015/01/20 | 2014833 | ET ACTIVEX Possible LEADTOOLS ActiveX Raster Twain AppName Method Access Buffer Overflow; [1] |
12,021 | 2015/01/20 | 2014832 | ET ACTIVEX Possible Wireless Manager Sony VAIO ConnectToNetwork Method Access Buffer Overflow; [1] |
12,020 | 2015/01/20 | 2014831 | ET ACTIVEX Possible Wireless Manager Sony VAIO SetTmpProfileOption Method Access Buffer Overflow; [1] |
12,019 | 2015/01/20 | 2014830 | ET CURRENT_EVENTS Redkit Java Exploit request to .class file; |
12,018 | 2015/01/20 | 2014829 | ET CURRENT_EVENTS Post Express Spam Inbound; |
12,017 | 2015/01/20 | 2014828 | ET CURRENT_EVENTS UPS Spam Inbound; |
12,016 | 2015/01/20 | 2014827 | ET CURRENT_EVENTS FedEX Spam Inbound; |
12,015 | 2015/01/20 | 2014826 | ET TROJAN Virus.Win32.Sality.aa Checkin; |
12,014 | 2015/01/20 | 2014825 | ET CURRENT_EVENTS Blackhole Landing Page Script Profile ASD; |
12,013 | 2015/01/20 | 2014824 | ET DELETED Redkit Java Exploit request to b.class; |
12,012 | 2015/01/20 | 2014823 | ET CURRENT_EVENTS Blackhole Malicious PDF asdvsa; |
< 301 302 303 304 305 306 307 308 309 310 > |