번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
10,661 | 2015/01/20 | 2013337 | ET TROJAN PoisonIvy.E Keepalive to CnC; [1] |
10,660 | 2015/01/20 | 2013336 | ET POLICY SSL MiTM Vulnerable iOS 4.x CDMA iPhone device; [1,2,3] |
10,659 | 2015/01/20 | 2013335 | ET DELETED SSL MiTM Vulnerable or EOL iOS 4.x device; [1,2,3] |
10,658 | 2015/01/20 | 2013334 | ET DELETED SSL MiTM Vulnerable or EOL iOS 3.x device; [1,2,3] |
10,657 | 2015/01/20 | 2013333 | ET MALWARE Zugo.com SearchToolbar User-Agent (SearchToolbar); [1,2] |
10,656 | 2015/01/20 | 2013332 | ET TROJAN FakeAV Landing Page; [1] |
10,655 | 2015/01/20 | 2013331 | ET TROJAN Ruskill Reporting on Local Scans; |
10,654 | 2015/01/20 | 2013330 | ET TROJAN Ruskill CnC Download Command 2; |
10,653 | 2015/01/20 | 2013329 | ET TROJAN Ruskill CnC Download Command 1; |
10,652 | 2015/01/20 | 2013328 | ET CURRENT_EVENTS DNS Query for Known Hostile Domain gooqlepics com; [1] |
10,651 | 2015/01/20 | 2013327 | ET MOBILE_MALWARE Android.Zitmo Forwarding SMS Message to CnC Server; [1] |
10,650 | 2015/01/20 | 2013326 | ET DELETED Dictcn Trojan Downloader Node Server Type; |
10,649 | 2015/01/20 | 2013325 | ET DELETED Dictcn Trojan Downloader Receiving XML Format Node ID File From CnC Server; |
10,648 | 2015/01/20 | 2013324 | ET DELETED Dictcn Trojan Downloader Receiving XML Format Update File From CnC Server; |
10,647 | 2015/01/20 | 2013323 | ET DELETED Dictcn Trojan Downloader Update Check to CnC; |
10,646 | 2015/01/20 | 2013322 | ET WEB_CLIENT Microsoft Visio 2003 mfc71enu.dll DLL Loading Arbitrary Code Execution Attempt; [1,2] |
10,645 | 2015/01/20 | 2013321 | ET WEB_CLIENT Internet Explorer toStaticHTML HTML Sanitizing Information Disclosure Attempt; |
10,644 | 2015/01/20 | 2013320 | ET SHELLCODE Unicode UTF-16 Heap Spray Attempt; |
10,643 | 2015/01/20 | 2013319 | ET SHELLCODE Unicode UTF-8 Heap Spray Attempt; |
10,642 | 2015/01/20 | 2013318 | ET TROJAN Google Warning Infected Local User; |
10,641 | 2015/01/20 | 2013317 | ET MOBILE_MALWARE Android.AdSms XML File From CnC Server; [1] |
10,640 | 2015/01/20 | 2013316 | ET MOBILE_MALWARE Android.AdSms Retrieving XML File from CnC Server; [1] |
10,639 | 2015/01/20 | 2013315 | ET TROJAN Suspicious User-Agent (Agent and 5 or 6 digits); |
10,638 | 2015/01/20 | 2013314 | ET TROJAN Phoenix Landing Page Obfuscated Javascript 2; |
10,637 | 2015/01/20 | 2013313 | ET TROJAN Obfuscated Javascript Often Used in the Blackhole Exploit Kit 3; |
10,636 | 2015/01/20 | 2013312 | ET TROJAN Possible Ponmocup Driveby Download; [1] |
10,635 | 2015/01/20 | 2013311 | ET POLICY HTTP Request to a *.dlinkddns.com domain; |
10,634 | 2015/01/20 | 2013310 | ET WEB_SPECIFIC_APPS WordPress PHP Speedy Plugin title parameter Cross Site Scripting Attempt; [1] |
10,633 | 2015/01/20 | 2013309 | ET WEB_SPECIFIC_APPS WordPress PHP Speedy Plugin page Parameter Local File Inclusion Attempt; [1] |
10,632 | 2015/01/20 | 2013308 | ET WEB_SPECIFIC_APPS WordPress PHP Speedy Plugin page Parameter Remote File inclusion Attempt; [1] |
10,631 | 2015/01/20 | 2013307 | ET WEB_SPECIFIC_APPS Nuke Evolution Xtreme pid Parameter UPDATE SET SQL Injection Attempt; [1] |
10,630 | 2015/01/20 | 2013306 | ET WEB_SPECIFIC_APPS Nuke Evolution Xtreme pid Parameter INSERT INTO SQL Injection Attempt; [1] |
10,629 | 2015/01/20 | 2013305 | ET WEB_SPECIFIC_APPS Nuke Evolution Xtreme pid Parameter UNION SELECT SQL Injection Attempt; [1] |
10,628 | 2015/01/20 | 2013304 | ET WEB_SPECIFIC_APPS Nuke Evolution Xtreme pid Parameter DELETE FROM SQL Injection Attempt; [1] |
10,627 | 2015/01/20 | 2013303 | ET WEB_SPECIFIC_APPS Nuke Evolution Xtreme pid Parameter SELECT FROM SQL Injection Attempt; [1] |
10,626 | 2015/01/20 | 2013300 | ET POLICY DivX Client SSL Connection via Self-Signed SSL Cert; |
10,625 | 2015/01/20 | 2013299 | ET MOBILE_MALWARE Android/HippoSms Method Request to CnC; [1] |
10,624 | 2015/01/20 | 2013298 | ET POLICY Nessus Server SSL certificate detected; |
10,623 | 2015/01/20 | 2013297 | ET POLICY Free SSL Certificate (StartCom Free Certificate Member); |
10,622 | 2015/01/20 | 2013296 | ET POLICY Free SSL Certificate Provider (StartCom Class 1 Primary Intermediate Server CA); |
10,621 | 2015/01/20 | 2013295 | ET POLICY Self Signed SSL Certificate (Snake Oil CA); |
10,620 | 2015/01/20 | 2013294 | ET POLICY Self Signed SSL Certificate (Persona Not Validated); |
10,619 | 2015/01/20 | 2013293 | ET TROJAN Win32/Glupteba CnC Checkin; [1] |
10,618 | 2015/01/20 | 2013292 | ET TROJAN Win32/Cycbot Initial Checkin to CnC; [1] |
10,617 | 2015/01/20 | 2013291 | ET TROJAN Win32/Cycbot Pay-Per-Install Executable Download; [1] |
10,616 | 2015/01/20 | 2013290 | ET POLICY MOBILE Apple device leaking UDID from SpringBoard via GET; [1,2] |
10,615 | 2015/01/20 | 2013289 | ET POLICY MOBILE Apple device leaking UDID from SpringBoard; [1,2] |
10,614 | 2015/01/20 | 2013288 | ET EXPLOIT HP OpenView Network Node Manager Toolbar.exe CGI Buffer Overflow Attempt; [1] |
10,613 | 2015/01/20 | 2013287 | ET TROJAN Papras Banking Trojan Checkin; [1] |
10,612 | 2015/01/20 | 2013286 | ET TROJAN Win32.Jadtre Retrieving Cfg File; |
< 321 322 323 324 325 326 327 328 329 330 > |