|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 1,411 | 2015/01/20 | 2003105 | ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's KeyFrame function call Object; [1,2] | 1,410 | 2015/01/20 | 2003104 | ET DELETED Microsoft Multimedia Controls - ActiveX control's KeyFrame function call CSLID; [1,2] | 1,409 | 2015/01/20 | 2003103 | ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's spline function call Object; [1,2] | 1,408 | 2015/01/20 | 2003102 | ET ACTIVEX Microsoft Multimedia Controls - ActiveX control's spline function call CLSID; [1,2] | 1,407 | 2015/01/20 | 2003099 | ET WEB_SERVER Poison Null Byte; [1,2] | 1,406 | 2015/01/20 | 2003097 | ET DELETED Possible Image Spam Inbound (complex rule); [1] | 1,405 | 2015/01/20 | 2003096 | ET DELETED Possible Image Spam Inbound (simple rule); [1] | 1,404 | 2015/01/20 | 2003095 | ET DELETED (UPX) VMM Detecting Torpig/Anserin/Sinowal Trojan; [1] | 1,403 | 2015/01/20 | 2003094 | ET DELETED VMM Detecting Torpig/Anserin/Sinowal Trojan; [1] | 1,402 | 2015/01/20 | 2003092 | ET DELETED Gmail gtalk; [1] | 1,401 | 2015/01/20 | 2003089 | ET GAMES STEAM Connection (v2); [1] | 1,400 | 2015/01/20 | 2003087 | ET WEB_SERVER Barracuda Spam Firewall preview_email.cgi Remote Directory Traversal Attempt; [1] | 1,399 | 2015/01/20 | 2003086 | ET WEB_SERVER Barracuda Spam Firewall preview_email.cgi Remote Command Execution; [1] | 1,398 | 2015/01/20 | 2003085 | ET WEB_SPECIFIC_APPS TWiki Configure Script TYPEOF Remote Command Execution Attempt; [1] | 1,397 | 2015/01/20 | 2003084 | ET MALWARE TROJAN_VB Microjoin; [1,2] | 1,396 | 2015/01/20 | 2003083 | ET TROJAN Dialer; [1,2] | 1,395 | 2015/01/20 | 2003082 | ET NETBIOS NETBIOS SMB-DS DCERPC NetrpPathCanonicalize request (possible MS06-040); [1,2] | 1,394 | 2015/01/20 | 2003081 | ET NETBIOS NETBIOS SMB DCERPC NetrpPathCanonicalize request (possible MS06-040); [1,2] | 1,393 | 2015/01/20 | 2003076 | ET MALWARE Content-loader.com (ownusa.info) Spyware Install; [1] | 1,392 | 2015/01/20 | 2003075 | ET MALWARE Content-loader.com Spyware Install 2; [1] | 1,391 | 2015/01/20 | 2003074 | ET MALWARE Content-loader.com Spyware Install; [1] | 1,390 | 2015/01/20 | 2003073 | ET DELETED ICMP Banking Trojan sending encrypted stolen data; [1,2] | 1,389 | 2015/01/20 | 2003072 | ET EXPLOIT Linksys WRT54g Authentication Bypass Attempt; [1,2] | 1,388 | 2015/01/20 | 2003071 | ET ATTACK_RESPONSE Possible /etc/passwd via HTTP (BSD style); [1] | 1,387 | 2015/01/20 | 2003070 | ET DELETED Korgo.U Reporting; [1,2] | 1,386 | 2015/01/20 | 2003069 | ET DELETED Anonymous Proxy Traffic from Inside; [1] | 1,385 | 2015/01/20 | 2003068 | ET SCAN Potential SSH Scan OUTBOUND; [1,2] | 1,384 | 2015/01/20 | 2003067 | ET EXPLOIT DOS Microsoft Windows SRV.SYS MAILSLOT; [1,2,3] | 1,383 | 2015/01/20 | 2003066 | ET TROJAN Torpig Reporting User Activity (wur8); [1,2] | 1,382 | 2015/01/20 | 2003065 | ET DELETED Cisco-MARS/JBoss Remote Command Execution; [1] | 1,381 | 2015/01/20 | 2003064 | ET DELETED Cisco-MARS/JBoss jmx-console POST; [1] | 1,380 | 2015/01/20 | 2003063 | ET DELETED WebAttacker RootLauncher; [1] | 1,379 | 2015/01/20 | 2003062 | ET USER_AGENTS 180 Solutions (Zango Installer) User Agent; [1] | 1,378 | 2015/01/20 | 2003061 | ET MALWARE 180solutions (Zango) Spyware Event Activity Post; [1,2] | 1,377 | 2015/01/20 | 2003060 | ET MALWARE 180solutions (Zango) Spyware Local Stats Post; [1,2] | 1,376 | 2015/01/20 | 2003059 | ET MALWARE 180solutions (Zango) Spyware TB Installer Download; [1,2] | 1,375 | 2015/01/20 | 2003058 | ET MALWARE 180solutions (Zango) Spyware Installer Download; [1,2] | 1,374 | 2015/01/20 | 2003057 | ET MALWARE 180solutions Spyware Actionlibs Download; [1,2] | 1,373 | 2015/01/20 | 2003056 | ET WEB_SPECIFIC_APPS EiQNetworks Security Analyzer Buffer Overflow; [1,2] | 1,372 | 2015/01/20 | 2003055 | ET MALWARE Suspicious FTP 220 Banner on Local Port (-); [1] | 1,371 | 2015/01/20 | 2003048 | ET POLICY Proxy Judge Discovery/Evasion (proxyjudge.cgi); [1] | 1,370 | 2015/01/20 | 2003047 | ET POLICY Proxy Judge Discovery/Evasion (prxjdg.cgi); [1] | 1,369 | 2015/01/20 | 2003046 | ET DELETED Real.com Game Arcade Install; [1] | 1,368 | 2015/01/20 | 2003045 | ET DELETED Real.com Game Arcade Install (User agent); [1] | 1,367 | 2015/01/20 | 2003041 | ET DELETED Win32.SMTP-Mailer SMTP Outbound; [1,2,3] | 1,366 | 2015/01/20 | 2003040 | ET DELETED PCMesh Anonymous Proxy client connect; [1] | 1,365 | 2015/01/20 | 2003039 | ET EXPLOIT UPnP DLink M-Search Overflow Attempt; [1,2] | 1,364 | 2015/01/20 | 2003038 | ET POLICY Known SSL traffic on port 8294 (Bloomberg) being excluded from SSL Alerts; [1] | 1,363 | 2015/01/20 | 2003037 | ET POLICY Known SSL traffic on port 8292 (Bloomberg) being excluded from SSL Alerts; [1] | 1,362 | 2015/01/20 | 2003036 | ET POLICY Known SSL traffic on port 8080 (proxy) being excluded from SSL Alerts; [1] | < 511 512 513 514 515 516 517 518 519 520 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|