| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 20,661 | 2015/03/12 |  2020660  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,660 | 2015/03/12 |  2020661  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,659 | 2015/03/12 |  2020664  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,658 | 2015/03/12 |  2020667  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,657 | 2015/03/12 |  2020659  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,656 | 2015/03/12 |  2020663  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,655 | 2015/03/12 |  2020658  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,654 | 2015/03/12 |  2020662  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,653 | 2015/03/11 |  2020657  |  ET TROJAN Possible malicious Office doc hidden in XML file; [1]  | 
| 20,652 | 2015/03/11 |  2020655  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 2; [1]  | 
| 20,651 | 2015/03/11 |  2020652  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacaveia.ru); [1]  | 
| 20,650 | 2015/03/11 |  2020656  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 3; [1]  | 
| 20,649 | 2015/03/11 |  2020653  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Firefox Plug-In Download; [1]  | 
| 20,648 | 2015/03/11 |  2020654  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Checkin 1; [1]  | 
| 20,647 | 2015/03/11 |  2020650  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacaoutra.ru); [1]  | 
| 20,646 | 2015/03/11 |  2020651  |  ET TROJAN Banker Boleto Fraud JS_BROBAN.SM Known Domain (bagacavoltou.ru); [1]  | 
| 20,645 | 2015/03/11 |  2020649  |  ET CURRENT_EVENTS Possible CryptoWall download from e-mail link March 9 2015;   | 
| 20,644 | 2015/03/11 |  2020648  |  ET WEB_SERVER Possible CVE-2015-1427 Elastic Search Sandbox Escape Remote Code Execution Attempt; [1]  | 
| 20,643 | 2015/03/11 |  2020647  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1]  | 
| 20,642 | 2015/03/11 |  2020645  |  ET TROJAN Win32/Trapwot FakeAV Post Infection CnC Beacon;   | 
| 20,641 | 2015/03/11 |  2020646  |  ET TROJAN Win32/Trapwot FakeAV Checkin;   | 
| 20,640 | 2015/03/08 |  2020644  |  ET CURRENT_EVENTS Unknown Malicious Second Stage Download URI Struct M2 Feb 06 2015;   | 
| 20,639 | 2015/03/08 |  2020640  |  ET POLICY DNS Query to .onion proxy Domain (cheetosnotburitos.com);   | 
| 20,638 | 2015/03/08 |  2020641  |  ET POLICY DNS Query to .onion proxy Domain (optionsketchupay.com);   | 
| 20,637 | 2015/03/08 |  2020643  |  ET CURRENT_EVENTS Unknown Malicious Second Stage Download URI Struct M1 Feb 06 2015;   | 
| 20,636 | 2015/03/08 |  2020638  |  ET CURRENT_EVENTS Evil Redirector Leading to EK Mar 06 2015;   | 
| 20,635 | 2015/03/08 |  2020642  |  ET POLICY DNS Query to .onion proxy Domain (solutionsaccountor.com);   | 
| 20,634 | 2015/03/08 |  2020639  |  ET POLICY DNS Query to .onion proxy Domain (optionstopaytos.com);   | 
| 20,633 | 2015/03/08 |  2020636  |  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1]  | 
| 20,632 | 2015/03/08 |  2020637  |  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1]  | 
| 20,631 | 2015/03/08 |  2020633  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,630 | 2015/03/08 |  2020635  |  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1]  | 
| 20,629 | 2015/03/08 |  2020632  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,628 | 2015/03/08 |  2020634  |  ET POLICY FREAK Weak Export Suite From Client (CVE-2015-0204); [1]  | 
| 20,627 | 2015/03/08 |  2020630  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,626 | 2015/03/08 |  2020631  |  ET EXPLOIT FREAK Weak Export Suite From Server (CVE-2015-0204); [1]  | 
| 20,625 | 2015/03/08 |  2020629  |  ET MALWARE MALWARE W32/WinWrapper.Adware User-Agent;   | 
| 20,624 | 2015/03/08 |  2020627  |  ET MALWARE W32/WinWrapper.Adware Initial Install Beacon;   | 
| 20,623 | 2015/03/08 |  2020628  |  ET MALWARE MALWARE W32/WinWrapper.Adware POST CnC Beacon;   | 
| 20,622 | 2015/03/08 |  2020625  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (TorrentLocker CnC); [1]  | 
| 20,621 | 2015/03/08 |  2020626  |  ET CURRENT_EVENTS Fiesta EK Landing URI Struct March 6 2015;   | 
| 20,620 | 2015/03/07 |  2020623  |  ET CURRENT_EVENTS Possible Tsukuba Banker Edwards Packed proxy.pac; [1]  | 
| 20,619 | 2015/03/07 |  2020624  |  ET CURRENT_EVENTS Possible Upatre SSL Cert www.eshaalfoundation.org;   | 
| 20,618 | 2015/03/07 |  2020622  |  ET CURRENT_EVENTS rechnung zip file download;   | 
| 20,617 | 2015/03/07 |  2020621  |  ET TROJAN Trojan.Bayrob Keepalive;   | 
| 20,616 | 2015/03/06 |  2020613  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 54; [1,2]  | 
| 20,615 | 2015/03/06 |  2020616  |  ET TROJAN Teerac/CryptoFortress .onion Proxy Domain (h63rbx7gkd3gygag);   | 
| 20,614 | 2015/03/06 |  2020619  |  ET POLICY DNS Query to .onion proxy Domain (bolistatapay.com);   | 
| 20,613 | 2015/03/06 |  2020620  |  ET POLICY DNS Query to .onion proxy Domain (sshowmethemoney.com);   | 
| 20,612 | 2015/03/06 |  2020618  |  ET POLICY DNS Query to .onion proxy Domain (torstorm.org);   | 
| < 121  122  123  124  125  126  127  128  129  130 > |