번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
10,411 | 2015/01/20 | 2013079 | ET MOBILE_MALWARE Android.YzhcSms URL for Possible File Download; [1] |
10,410 | 2015/01/20 | 2013078 | ET MOBILE_MALWARE Android.YzhcSms CnC Keepalive Message; [1] |
10,409 | 2015/01/20 | 2013077 | ET CURRENT_EVENTS Blackhole Exploit Pack HCP overflow Media Player lt 10; |
10,408 | 2015/01/20 | 2013076 | ET TROJAN Zeus Bot GET to Google checking Internet connectivity; [1,2] |
10,407 | 2015/01/20 | 2013075 | ET TROJAN Large DNS Query possible covert channel; |
10,406 | 2015/01/20 | 2013074 | ET SCADA DATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow Vulnerability; [1] |
10,405 | 2015/01/20 | 2013073 | ET TROJAN Win32.Meredrop Checkin; [1] |
10,404 | 2015/01/20 | 2013072 | ET MOBILE_MALWARE Android.HongTouTou Checkin; [1] |
10,403 | 2015/01/20 | 2013071 | ET TROJAN Dropper.MSIL.Agent.ate Checkin; [1] |
10,402 | 2015/01/20 | 2013070 | ET WEB_CLIENT Adobe Shockwave Director tSAC Chunk memory corruption Attempt; [1] |
10,401 | 2015/01/20 | 2013069 | ET WEB_CLIENT Adobe Shockwave rcsL Chunk Remote Code Execution Attempt; [1] |
10,400 | 2015/01/20 | 2013068 | ET WEB_SERVER Possible GRANT TO SQL Injection Attempt; [1] |
10,399 | 2015/01/20 | 2013067 | ET DELETED Win32/Fynloski Backdoor Keepalive Message; [1] |
10,398 | 2015/01/20 | 2013066 | ET CURRENT_EVENTS Java Exploit Attempt applet via file URI setAttribute; [1] |
10,397 | 2015/01/20 | 2013065 | ET CURRENT_EVENTS Possible CVE-2011-2110 Flash Exploit Attempt; [1] |
10,396 | 2015/01/20 | 2013064 | ET TROJAN Possible Tracur.Q HTTP Communication; [1] |
10,395 | 2015/01/20 | 2013063 | ET MOBILE_MALWARE DroidKungFu Checkin 3; [1,2,3,4] |
10,394 | 2015/01/20 | 2013062 | ET TROJAN MacShield FakeAV CnC Communication; [1] |
10,393 | 2015/01/20 | 2013061 | ET CURRENT_EVENTS Sidename.js Injected Script Served by Local WebServer; [1] |
10,392 | 2015/01/20 | 2013060 | ET DELETED Client Visiting Sidename.js Injected Website - Malware Related; [1] |
10,391 | 2015/01/20 | 2013059 | ET POLICY BitCoin; |
10,390 | 2015/01/20 | 2013058 | ET WEB_SERVER Outbound PHP User-Agent; [1] |
10,389 | 2015/01/20 | 2013057 | ET WEB_SERVER Inbound PHP User-Agent; [1] |
10,388 | 2015/01/20 | 2013056 | ET POLICY Peach C Library User Agent Outbound; [1,2] |
10,387 | 2015/01/20 | 2013055 | ET POLICY Peach C Library User Agent Inbound; [1,2] |
10,386 | 2015/01/20 | 2013054 | ET USER_AGENTS PyCurl Suspicious User Agent Outbound; [1] |
10,385 | 2015/01/20 | 2013053 | ET WEB_SERVER PyCurl Suspicious User Agent Inbound; [1] |
10,384 | 2015/01/20 | 2013052 | ET USER_AGENTS pxyscand/ Suspicious User Agent Outbound; [1] |
10,383 | 2015/01/20 | 2013051 | ET WEB_SERVER pxyscand Suspicious User Agent Inbound; [1] |
10,382 | 2015/01/20 | 2013050 | ET USER_AGENTS Binget PHP Library User Agent Outbound; [1,2] |
10,381 | 2015/01/20 | 2013049 | ET WEB_SERVER Binget PHP Library User Agent Inbound; [1,2] |
10,380 | 2015/01/20 | 2013048 | ET CURRENT_EVENTS Fake Shipping Invoice Request to JPG.exe Executable; |
10,379 | 2015/01/20 | 2013047 | ET TROJAN DonBot Checkin; [1] |
10,378 | 2015/01/20 | 2013046 | ET TROJAN DLoader PWS Module Data Upload Activity; [1,2,3,4,5] |
10,377 | 2015/01/20 | 2013045 | ET TROJAN DLoader File Download Request Activity; [1,2,3,4,5] |
10,376 | 2015/01/20 | 2013044 | ET MOBILE_MALWARE Android.Plankton/Tonclank Control Server Responding With JAR Download URL; [1,2] |
10,375 | 2015/01/20 | 2013043 | ET POLICY Android.Plankton/Tonclank Successful Installation Device Information POST Message Body; [1,2] |
10,374 | 2015/01/20 | 2013042 | ET POLICY Android.Plankton/Tonclank Successful Installation Device Information POST; [1,2] |
10,373 | 2015/01/20 | 2013041 | ET MOBILE_MALWARE DNS Query For Known Mobile Malware Control Server Searchwebmobile.com; [1] |
10,372 | 2015/01/20 | 2013040 | ET MOBILE_MALWARE Android.Tonclank JAR File Download; [1] |
10,371 | 2015/01/20 | 2013039 | ET DELETED Android.Tonclank Sending Device Information; [1] |
10,370 | 2015/01/20 | 2013038 | ET MOBILE_MALWARE DNS Query For Known Mobile Malware Control Server Waplove.cn; [1] |
10,369 | 2015/01/20 | 2013037 | ET POLICY Java EXE Download; |
10,368 | 2015/01/20 | 2013036 | ET TROJAN Java EXE Download by Vulnerable Version - Likely Driveby; |
10,367 | 2015/01/20 | 2013035 | ET POLICY Java Client HTTP Request; |
10,366 | 2015/01/20 | 2013034 | ET TROJAN WebToolbar.Win32.WhenU.r Reporting; [1] |
10,365 | 2015/01/20 | 2013033 | ET USER_AGENTS EmailSiphon Suspicious User-Agent Outbound; [1] |
10,364 | 2015/01/20 | 2013032 | ET USER_AGENTS EmailSiphon Suspicious User-Agent Inbound; [1] |
10,363 | 2015/01/20 | 2013031 | ET POLICY Python-urllib/ Suspicious User Agent; [1] |
10,362 | 2015/01/20 | 2013030 | ET POLICY libwww-perl User-Agent; [1] |
< 331 332 333 334 335 336 337 338 339 340 > |