번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
10,261 | 2015/01/20 | 2012929 | ET ACTIVEX Cisco AnyConnect VPN Secure Mobility Client Arbitrary Program Execution Attempt; [1] |
10,260 | 2015/01/20 | 2012928 | ET DELETED DYNAMIC_DNS HTTP Request to a *.dyndns-*.com domain; |
10,259 | 2015/01/20 | 2012927 | ET DELETED DYNAMIC_DNS HTTP Request to a *.dyndns.* domain; |
10,258 | 2015/01/20 | 2012926 | ET WEB_SERVER Apache APR apr_fnmatch Stack Overflow Denial of Service; [1,2] |
10,257 | 2015/01/20 | 2012925 | ET SHELLCODE Javascript Split String Unicode Heap Spray Attempt; |
10,256 | 2015/01/20 | 2012924 | ET MOBILE_MALWARE Android/Smspacem CnC Communication Attempt; [1] |
10,255 | 2015/01/20 | 2012923 | ET TROJAN Possible TDSS Base64 Encoded Command 3; |
10,254 | 2015/01/20 | 2012922 | ET TROJAN Possible TDSS Base64 Encoded Command 2; |
10,253 | 2015/01/20 | 2012921 | ET TROJAN Possible TDSS Base64 Encoded Command 1; |
10,252 | 2015/01/20 | 2012919 | ET WEB_SPECIFIC_APPS Nagios Expand Parameter XSS Attempt; |
10,251 | 2015/01/20 | 2012918 | ET TROJAN Possible TDSS Trojan GET with xxxx_ string; |
10,250 | 2015/01/20 | 2012917 | ET POLICY URL Contains pword Parameter; |
10,249 | 2015/01/20 | 2012916 | ET POLICY URL Contains passphrase Parameter; |
10,248 | 2015/01/20 | 2012915 | ET POLICY URL Contains pw Parameter; |
10,247 | 2015/01/20 | 2012914 | ET POLICY URL Contains pwd Parameter; |
10,246 | 2015/01/20 | 2012913 | ET POLICY URL Contains pass Parameter; |
10,245 | 2015/01/20 | 2012912 | ET POLICY URL Contains passwd Parameter; |
10,244 | 2015/01/20 | 2012911 | ET POLICY URL Contains password Parameter; |
10,243 | 2015/01/20 | 2012910 | ET DELETED CPL Trojan Downloader Request; |
10,242 | 2015/01/20 | 2012909 | ET USER_AGENTS Suspicious User-Agent Fragment (WORKED); |
10,241 | 2015/01/20 | 2012908 | ET TROJAN Backdoor Win32/Begman.A Checkin; [1,2,3,4] |
10,240 | 2015/01/20 | 2012907 | ET WEB_CLIENT Download of PDF With Compressed Flash Content; [1,2] |
10,239 | 2015/01/20 | 2012906 | ET WEB_CLIENT Download of PDF With Uncompressed Flash Content flowbit set; [1,2] |
10,238 | 2015/01/20 | 2012905 | ET ACTIVEX Magneto ICMP ActiveX ICMPSendEchoRequest Remote Code Execution Attempt; [1] |
10,237 | 2015/01/20 | 2012904 | ET MOBILE_MALWARE SymbOS/SuperFairy.D Bookmarked Connection to Server; [1] |
10,236 | 2015/01/20 | 2012903 | ET DNS DNS Query for a Suspicious *.qc.cx domain; |
10,235 | 2015/01/20 | 2012902 | ET DNS DNS Query for a Suspicious *.be.ma domain; |
10,234 | 2015/01/20 | 2012901 | ET DNS DNS Query for a Suspicious *.noc.su domain; |
10,233 | 2015/01/20 | 2012900 | ET DNS DNS Query for a Suspicious *.ae.am domain; |
10,232 | 2015/01/20 | 2012899 | ET POLICY HTTP Request to a *.qc.cx domain; |
10,231 | 2015/01/20 | 2012898 | ET POLICY HTTP Request to a *.be.ma domain; |
10,230 | 2015/01/20 | 2012897 | ET POLICY HTTP Request to a *.noc.su domain; |
10,229 | 2015/01/20 | 2012896 | ET POLICY HTTP Request to a *.ae.am domain; |
10,228 | 2015/01/20 | 2012895 | ET TROJAN Dropper.Win32.Agent.ahju Checkin; [1,2] |
10,227 | 2015/01/20 | 2012894 | ET TROJAN Dropper.Win32.Agent.bpxo Checkin; [1,2] |
10,226 | 2015/01/20 | 2012893 | ET USER_AGENTS Known Skunkx DDOS Bot User-Agent Cyberdog; [1] |
10,225 | 2015/01/20 | 2012892 | ET TROJAN JKDDOS Bot CnC Phone Home Message; [1,2] |
10,224 | 2015/01/20 | 2012891 | ET POLICY Http Client Body contains pword= in cleartext; |
10,223 | 2015/01/20 | 2012890 | ET POLICY Http Client Body contains passphrase= in cleartext; |
10,222 | 2015/01/20 | 2012889 | ET POLICY Http Client Body contains pw= in cleartext; |
10,221 | 2015/01/20 | 2012888 | ET POLICY Http Client Body contains pwd= in cleartext; |
10,220 | 2015/01/20 | 2012887 | ET POLICY Http Client Body contains pass= in cleartext; |
10,219 | 2015/01/20 | 2012886 | ET POLICY Http Client Body contains passwd= in cleartext; |
10,218 | 2015/01/20 | 2012885 | ET POLICY Http Client Body contains password= in cleartext; |
10,217 | 2015/01/20 | 2012884 | ET CURRENT_EVENTS Java Exploit Attempt applet via file URI param; [1] |
10,216 | 2015/01/20 | 2012883 | ET DELETED MALVERTISING Malicious Advertizing URL in.cgi; |
10,215 | 2015/01/20 | 2012882 | ET TROJAN Backdoor.Win32.Poison.AU checkin; [1] |
10,214 | 2015/01/20 | 2012881 | ET WEB_SPECIFIC_APPS e107 permLink Parameter Remote File inclusion Attempt; [1] |
10,213 | 2015/01/20 | 2012880 | ET WEB_SPECIFIC_APPS e107 trackback_url Parameter Remote File inclusion Attempt; [1] |
10,212 | 2015/01/20 | 2012879 | ET WEB_SPECIFIC_APPS e107 imgp Parameter Remote File inclusion Attempt; [1] |
< 331 332 333 334 335 336 337 338 339 340 > |