번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
14,161 | 2015/01/20 | 2017038 | ET CURRENT_EVENTS RedKit Jar Download June 20 2013; |
14,160 | 2015/01/20 | 2017037 | ET CURRENT_EVENTS Javadoc API Redirect CVE-2013-1571; |
14,159 | 2015/01/20 | 2017036 | ET TROJAN Activity related to APT.Seinup Checkin 1; [1] |
14,158 | 2015/01/20 | 2017035 | ET CURRENT_EVENTS Malicious Redirect June 18 2013; |
14,157 | 2015/01/20 | 2017034 | ET CURRENT_EVENTS NailedPack EK Landing June 18 2013; [1] |
14,156 | 2015/01/20 | 2017032 | ET CURRENT_EVENTS MALVERTISING Flash - URI - /loading?vkn=; |
14,155 | 2015/01/20 | 2017031 | ET CURRENT_EVENTS Unknown_InIFRAME - In Referer; |
14,154 | 2015/01/20 | 2017030 | ET CURRENT_EVENTS Unknown_InIFRAME - Redirect to /iniframe/ URI; |
14,153 | 2015/01/20 | 2017029 | ET CURRENT_EVENTS Unknown_InIFRAME - URI Structure; |
14,152 | 2015/01/20 | 2017028 | ET CURRENT_EVENTS MALVERTISING Unknown_InIFRAME - RedTDS URI Structure; |
14,151 | 2015/01/20 | 2017027 | ET TROJAN Unknown Webserver Backdoor Domain (google-analytcs); [1] |
14,150 | 2015/01/20 | 2017026 | ET TROJAN Unknown Webserver Backdoor; [1] |
14,149 | 2015/01/20 | 2017025 | ET ATTACK_RESPONSE Net User Command Response; |
14,148 | 2015/01/20 | 2017024 | ET CURRENT_EVENTS CritX/SafePack/FlashPack URI Format June 17 2013 3; [1] |
14,147 | 2015/01/20 | 2017023 | ET CURRENT_EVENTS CritX/SafePack/FlashPack URI Format June 17 2013 2; [1] |
14,146 | 2015/01/20 | 2017022 | ET CURRENT_EVENTS CritX/SafePack/FlashPack URI Format June 17 2013 1; [1] |
14,145 | 2015/01/20 | 2017021 | ET TROJAN TripleNine RAT Checkin; |
14,144 | 2015/01/20 | 2017020 | ET CURRENT_EVENTS Dotka Chef EK exploit/payload URI request; |
14,143 | 2015/01/20 | 2017019 | ET CURRENT_EVENTS Dotka Chef EK .cache request; |
14,142 | 2015/01/20 | 2017018 | ET CURRENT_EVENTS Unknown EK Jar 3 June 12 2013; |
14,141 | 2015/01/20 | 2017017 | ET CURRENT_EVENTS Unknown EK Jar 2 June 12 2013; |
14,140 | 2015/01/20 | 2017016 | ET CURRENT_EVENTS Unknown EK Jar 1 June 12 2013; |
14,139 | 2015/01/20 | 2017015 | ET POLICY DropBox User Content Access over SSL; [1] |
14,138 | 2015/01/20 | 2017014 | ET CURRENT_EVENTS Unknown EK Landing (Payload Downloaded Via Dropbox); |
14,137 | 2015/01/20 | 2017013 | ET CURRENT_EVENTS Possible 2012-1533 altjvm RCE via JNLP command injection; |
14,136 | 2015/01/20 | 2017012 | ET CURRENT_EVENTS Possible 2012-1533 altjvm (jvm.dll) Requested Over WeBDAV; |
14,135 | 2015/01/20 | 2017011 | ET CURRENT_EVENTS Glazunov EK Downloading Jar; |
14,134 | 2015/01/20 | 2017010 | ET WEB_SERVER Possible SQLi xp_cmdshell POST body; |
14,133 | 2015/01/20 | 2017009 | ET TROJAN KimJongRAT cnc exe pull; [1] |
14,132 | 2015/01/20 | 2017008 | ET EXPLOIT CVE-2013-1331 Microsoft Office PNG Exploit Specific; |
14,131 | 2015/01/20 | 2017007 | ET EXPLOIT CVE-2013-1331 Microsoft Office PNG Exploit plugin-detect script access; [1] |
14,130 | 2015/01/20 | 2017006 | ET EXPLOIT CVE-2013-1331 Microsoft Office PNG Exploit plugin-detect script access; [1] |
14,129 | 2015/01/20 | 2017005 | ET CURRENT_EVENTS Possible Microsoft Office PNG overflow attempt invalid tEXt chunk length; [1] |
14,128 | 2015/01/20 | 2017004 | ET TROJAN Win32/Tobfy.S; |
14,127 | 2015/01/20 | 2017003 | ET CURRENT_EVENTS Kuluoz.B Spam Campaign Shipment_Label.exe in Zip; |
14,126 | 2015/01/20 | 2017002 | ET CURRENT_EVENTS Kuluoz.B Shipping Label Spam Campaign; |
14,125 | 2015/01/20 | 2017001 | ET TROJAN Connection to a cert.pl Sinkhole IP (Possible Infected Host); |
14,124 | 2015/01/20 | 2017000 | ET TROJAN Connection to unallocated address space 1.1.1.0/24; |
14,123 | 2015/01/20 | 2016999 | ET TROJAN Connection to Microsoft Sinkhole IP (Possbile Infected Host); |
14,122 | 2015/01/20 | 2016998 | ET TROJAN Connection to Fitsec Sinkhole IP (Possible Infected Host); |
14,121 | 2015/01/20 | 2016997 | ET TROJAN Connection to Dr Web Sinkhole IP(Possible Infected Host); |
14,120 | 2015/01/20 | 2016996 | ET TROJAN Connection to Zinkhole Sinkhole IP (Possible Infected Host); |
14,119 | 2015/01/20 | 2016995 | ET TROJAN Connection to 1&1 Sinkhole IP (Possible Infected Host); |
14,118 | 2015/01/20 | 2016994 | ET TROJAN Connection to Georgia Tech Sinkhole IP (Possible Infected Host); |
14,117 | 2015/01/20 | 2016993 | ET TROJAN Connection to AnubisNetworks Sinkhole IP (Possible Infected Host); |
14,116 | 2015/01/20 | 2016992 | ET WEB_SERVER WebShell Generic - *.tar.gz in POST body; |
14,115 | 2015/01/20 | 2016991 | ET TROJAN Alina Server Response Code; [1] |
14,114 | 2015/01/20 | 2016990 | ET TROJAN KeyBoy Backdoor File Upload Response Header; [1] |
14,113 | 2015/01/20 | 2016989 | ET TROJAN KeyBoy Backdoor File Download Response Header; [1] |
14,112 | 2015/01/20 | 2016988 | ET TROJAN KeyBoy Backdoor File Manager Response Header; [1] |
< 251 252 253 254 255 256 257 258 259 260 > |