시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6112015/01/20 2001869  ET MALWARE Spyware User-Agent (Sidesearch); [1
6102015/01/20 2001868  ET MALWARE Spyware User-Agent (sureseeker); [1
6092015/01/20 2001867  ET MALWARE Search Engine 2000 Spyware User-Agent (searchengine); [1
6082015/01/20 2001865  ET MALWARE MyWebSearch Spyware User-Agent (MyWebSearch); [1
6072015/01/20 2001864  ET MALWARE Fun Web Products Spyware User-Agent (MyWay); [1
6062015/01/20 2001858  ET MALWARE Hotbar Spyware User-Agent (Hotbar); [1
6052015/01/20 2001855  ET MALWARE Fun Web Products Spyware User-Agent (FunWebProducts); [1
6042015/01/20 2001854  ET MALWARE EZULA Spyware User Agent; [1
6032015/01/20 2001853  ET MALWARE Easy Search Bar Spyware User-Agent (ESB); [1
6022015/01/20 2001852  ET MALWARE 404Search Spyware User-Agent (404search); [1
6012015/01/20 2001850  ET MALWARE Likely Trojan/Spyware Installer Requested (1); [1
6002015/01/20 2001849  ET EXPLOIT MS05-021 Exchange Link State - Possible Attack (2); [1,2,3
5992015/01/20 2001848  ET EXPLOIT MS05-021 Exchange Link State - Possible Attack (1); [1,2,3
5982015/01/20 2001841  ET DELETED UDP traffic - Likely Limewire; [1,2
5972015/01/20 2001815  ET DELETED Spambot Suspicious 220 Banner on Local Port; [1
5962015/01/20 2001812  ET DELETED KazaaClient P2P Traffic; [1,2
5952015/01/20 2001811  ET WEB_CLIENT Encoded javascriptdocument.write - usually hostile; [1
5942015/01/20 2001810  ET DELETED PHP remote file include exploit attempt; [1
5932015/01/20 2001809  ET P2P Limewire P2P UDP Traffic; [1,2
5922015/01/20 2001808  ET P2P LimeWire P2P Traffic; [1,2
5912015/01/20 2001807  ET DELETED CAN-2005-0399 Gif Vuln via http; [1
5902015/01/20 2001805  ET CHAT ICQ Message; [1
5892015/01/20 2001804  ET CHAT ICQ Login; [1
5882015/01/20 2001803  ET CHAT ICQ Status Change (2); [1
5872015/01/20 2001802  ET CHAT ICQ Status Change (1); [1
5862015/01/20 2001801  ET CHAT ICQ Status Invisible; [1
5852015/01/20 2001796  ET P2P Kazaa over UDP; [1,2
5842015/01/20 2001795  ET DOS Excessive SMTP MAIL-FROM DDoS; [1
5832015/01/20 2001794  ET MALWARE Incredisearch.com Spyware Activity; [1
5822015/01/20 2001793  ET MALWARE Incredisearch.com Spyware Ping; [1
5812015/01/20 2001783  ET MALWARE Media Pass ActiveX Install; [1,2,3
5802015/01/20 2001780  ET EXPLOIT Solaris TTYPROMPT environment variable set; [1,2
5792015/01/20 2001768  ET WEB_SERVER MSSQL Server OLEDB asp error; [1,2
5782015/01/20 2001766  ET DELETED BugBear@MM Worm Copied to Startup Folder; [1,2
5772015/01/20 2001765  ET DELETED BugBear@MM virus in Network share; [1,2
5762015/01/20 2001764  ET TROJAN Bugbear@MM virus via SMTP; [1,2
5752015/01/20 2001762  ET DELETED phpbb Session Cookie; [1,2
5742015/01/20 2001761  ET MALWARE ABX Toolbar ActiveX Install; [1,2
5732015/01/20 2001754  ET EXPLOIT Pwdump4 Session Established GetHash port 445; [1
5722015/01/20 2001753  ET EXPLOIT Pwdump4 Session Established GetHash port 139; [1
5712015/01/20 2001748  ET MALWARE Pynix.dll BHO Activity; [1,2
5702015/01/20 2001747  ET MALWARE My-Stats.com Spyware Checkin; [1
5692015/01/20 2001746  ET MALWARE Enhance My Search Spyware User-Agent (HelperH); [1
5682015/01/20 2001744  ET MALWARE Searchmiracle.com Spyware Install (install); [1,2
5672015/01/20 2001743  ET TROJAN HackerDefender Root Kit Remote Connection Attempt Detected; [1,2
5662015/01/20 2001742  ET EXPLOIT Arkeia full remote access without password or authentication; [1,2
5652015/01/20 2001737  ET MALWARE ak-networks.com Spyware Code Install; [1
5642015/01/20 2001736  ET MALWARE UCMore Spyware User-Agent (UCmore); [1
5632015/01/20 2001735  ET MALWARE A-d-w-a-r-e.com Activity (cmd); [1,2
5622015/01/20 2001734  ET MALWARE Tibsystems Spyware Install (2); [1
< 531  532  533  534  535  536  537  538  539  540 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.