번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
11,411 | 2015/01/20 | 2014183 | ET MALWARE Malicious ad_track.php file Reporting; |
11,410 | 2015/01/20 | 2014182 | ET DELETED Malicious getpvstat.php file Reporting; |
11,409 | 2015/01/20 | 2014181 | ET DELETED Malicious file BaiduPlayer1.0.21.25.exe download; |
11,408 | 2015/01/20 | 2014180 | ET WEB_SPECIFIC_APPS SAPID get_infochannel.inc.php Remote File inclusion Attempt; [1] |
11,407 | 2015/01/20 | 2014179 | ET WEB_SPECIFIC_APPS Joomla mod_currencyconverter from Cross Site Scripting Attempt; [1] |
11,406 | 2015/01/20 | 2014178 | ET DELETED Unknown Malware Checkin Possibly ZeuS; [1] |
11,405 | 2015/01/20 | 2014177 | ET DELETED Incognito/Sakura exploit kit binary download request; |
11,404 | 2015/01/20 | 2014176 | ET DELETED Incognito/Sakura exploit kit landing page with obfuscated URLs; |
11,403 | 2015/01/20 | 2014175 | ET TROJAN Win32.MSUpdater C&C traffic GET; [1,2,3] |
11,402 | 2015/01/20 | 2014174 | ET TROJAN Win32/Cryptrun.B/MSUpdater C&C traffic 1; [1,2,3,4] |
11,401 | 2015/01/20 | 2014173 | ET TROJAN Win32/Cryptrun.B Connectivity check; [1] |
11,400 | 2015/01/20 | 2014172 | ET TROJAN TROJAN ClickCounter Connectivity Check; |
11,399 | 2015/01/20 | 2014171 | ET CURRENT_EVENTS Styx Exploit Kit Landing; |
11,398 | 2015/01/20 | 2014170 | ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related; [1] |
11,397 | 2015/01/20 | 2014169 | ET POLICY DNS Query for .su TLD (Soviet Union) Often Malware Related; [1] |
11,396 | 2015/01/20 | 2014168 | ET CURRENT_EVENTS DRIVEBY Unknown Landing Page Received; |
11,395 | 2015/01/20 | 2014167 | ET TROJAN W32/Mentory CnC Server Providing File Info Details; |
11,394 | 2015/01/20 | 2014166 | ET TROJAN W32/Mentory CnC Server Providing Update Details; |
11,393 | 2015/01/20 | 2014165 | ET TROJAN Suspicious User-Agent MyAgrent; |
11,392 | 2015/01/20 | 2014164 | ET TROJAN W32/DelfInject.A CnC Checkin 2; |
11,391 | 2015/01/20 | 2014163 | ET TROJAN Bifrose/Cycbot Checkin 2; |
11,390 | 2015/01/20 | 2014162 | ET MOBILE_MALWARE Android/SndApps.SM Sending Information to CnC; [1] |
11,389 | 2015/01/20 | 2014161 | ET MOBILE_MALWARE Android/FakeTimer.A Reporting to CnC; [1,2] |
11,388 | 2015/01/20 | 2014160 | ET DELETED Blackhole OBE Java Exploit request to /content/obe.jar; |
11,387 | 2015/01/20 | 2014159 | ET DELETED Blackhole Rhino Java Exploit request to /content/rino.jar; |
11,386 | 2015/01/20 | 2014158 | ET CURRENT_EVENTS Blackhole Acrobat 1-7 PDF exploit download request 4; |
11,385 | 2015/01/20 | 2014157 | ET CURRENT_EVENTS Blackhole Acrobat 8/9.3 PDF exploit download request 4; |
11,384 | 2015/01/20 | 2014156 | ET WEB_CLIENT Microsoft Windows Media component specific exploit; |
11,383 | 2015/01/20 | 2014155 | ET CURRENT_EVENTS JavaScript Obfuscation JSXX Script; [1] |
11,382 | 2015/01/20 | 2014154 | ET CURRENT_EVENTS DRIVEBY PDF Containing Subform with JavaScript; |
11,381 | 2015/01/20 | 2014153 | ET DOS High Orbit Ion Cannon (HOIC) Attack Inbound Generic Detection Double Spaced UA; [1] |
11,380 | 2015/01/20 | 2014152 | ET TROJAN Gozi Checkin to CnC; |
11,379 | 2015/01/20 | 2014151 | ET CURRENT_EVENTS Known Malicious Link Leading to Exploit Kits (t.php?id=is1); |
11,378 | 2015/01/20 | 2014150 | ET TROJAN Suspicious executable download possible Trojan NgrBot; |
11,377 | 2015/01/20 | 2014149 | ET INFO Possible URL List or Clickfraud URLs Delivered To Client; |
11,376 | 2015/01/20 | 2014148 | ET CURRENT_EVENTS Sakura Exploit Kit Binary Load Request; |
11,375 | 2015/01/20 | 2014147 | ET CURRENT_EVENTS Sakura Exploit Kit Landing Page Request; [1] |
11,374 | 2015/01/20 | 2014146 | ET TROJAN Win32/Spy.Banker Reporting Via SMTP; |
11,373 | 2015/01/20 | 2014145 | ET TROJAN PoisonIvy.Ehy Keepalive to CnC; |
11,372 | 2015/01/20 | 2014144 | ET DELETED PoisonIvy.Eks Keepalive to CnC; |
11,371 | 2015/01/20 | 2014143 | ET DELETED PoisonIvy.Esf Keepalive to CnC; |
11,370 | 2015/01/20 | 2014142 | ET CURRENT_EVENTS Likely Driveby Delivered Malicious PDF; |
11,369 | 2015/01/20 | 2014141 | ET DOS LOIC Javascript DDoS Outbound; [1,2] |
11,368 | 2015/01/20 | 2014140 | ET WEB_SERVER LOIC Javascript DDoS Inbound; [1,2] |
11,367 | 2015/01/20 | 2014139 | ET TROJAN Query to Known CnC Domain msnsolution.nicaze.net; |
11,366 | 2015/01/20 | 2014138 | ET DELETED DRIVEBY Generic Java Rhino Scripting Engine Exploit Previously Requested class.class; |
11,365 | 2015/01/20 | 2014137 | ET MALWARE Common Adware Library ISX User Agent Detected; [1] |
11,364 | 2015/01/20 | 2014136 | ET CURRENT_EVENTS Unknown Java Exploit Version Check with hidden applet; |
11,363 | 2015/01/20 | 2014135 | ET TROJAN Zeus/Reveton checkin to /images.rar; |
11,362 | 2015/01/20 | 2014133 | ET TROJAN W32/Jiwerks.A Checkin; |
< 311 312 313 314 315 316 317 318 319 320 > |