| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 25,461 | 2017/11/17 | 2025010 | ET TROJAN Powershell commands sent B64 1; |
| 25,460 | 2017/11/17 | 2024999 | ET CURRENT_EVENTS Successful OWA Phish Apr 25 2017; |
| 25,459 | 2017/11/17 | 2025002 | ET CURRENT_EVENTS Successful Personalized OWA Webmail Phish Oct 04 2016; |
| 25,458 | 2017/11/17 | 2025004 | ET CURRENT_EVENTS Google Drive Phishing Landing Sept 3; |
| 25,457 | 2017/11/17 | 2025005 | ET CURRENT_EVENTS Possible Successful Generic Phish Jan 14 2016; |
| 25,456 | 2017/11/17 | 2025006 | ET CURRENT_EVENTS Possible Phishing Redirect Feb 09 2016; |
| 25,455 | 2017/11/17 | 2025009 | ET POLICY PTsecurity Remote Desktop AeroAdmin handshake; |
| 25,454 | 2017/11/17 | 2025011 | ET TROJAN Powershell commands sent B64 2; |
| 25,453 | 2017/11/17 | 2024998 | ET CURRENT_EVENTS Successful Generic AES Phish M2 Oct 24 2017; |
| 25,452 | 2017/11/17 | 2025000 | ET CURRENT_EVENTS Possible Successful Phish to Hostinger Domains Apr 4 M4; |
| 25,451 | 2017/11/17 | 2025001 | ET CURRENT_EVENTS Possible Successful Websocket Credential Phish Sep 15 2017; |
| 25,450 | 2017/11/17 | 2024997 | ET CURRENT_EVENTS Successful Generic AES Phish M1 Oct 24 2017; |
| 25,449 | 2017/11/17 | 2025003 | ET CURRENT_EVENTS Successful TeamIPwned Phish Aug 30 2016; |
| 25,448 | 2017/11/17 | 2025008 | ET POLICY PTsecurity Remote Desktop AeroAdmin Server Hello; |
| 25,447 | 2017/11/16 | 2405149 | ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2] |
| 25,446 | 2017/11/16 | 2024994 | ET WEB_CLIENT PWNJS JS Constructs; [1] |
| 25,445 | 2017/11/16 | 2024993 | ET WEB_CLIENT Type Confusion Microsoft Edge (CVE-2017-11873); [1] |
| 25,444 | 2017/11/16 | 2024992 | ET TROJAN Lazarus FALLCHILL Fake SSL Checkin 2; [1] |
| 25,443 | 2017/11/16 | 2024996 | ET WEB_CLIENT Google Chrome XSS (CVE-2017-5124); |
| 25,442 | 2017/11/16 | 2024990 | ET TROJAN Lazarus FALLCHILL Fake SSL Checkin 1; [1] |
| 25,441 | 2017/11/16 | 2024991 | ET TROJAN Win32/TinyNuke CnC Checkin; |
| 25,440 | 2017/11/16 | 2024995 | ET WEB_CLIENT Apple Safari UXSS (CVE-2017-7089); |
| 25,439 | 2017/11/15 | 2405148 | ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2] |
| 25,438 | 2017/11/15 | 2405147 | ET CNC Shadowserver Reported CnC Server Port 54321 Group 1; [1,2] |
| 25,437 | 2017/11/15 | 2024985 | ET CURRENT_EVENTS SocEng Fake Font Download Template Nov 14 2017; [1] |
| 25,436 | 2017/11/15 | 2024983 | ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1] |
| 25,435 | 2017/11/15 | 2024986 | ET TROJAN SunOrcal Reaver Domain Observed (tashdqdxp .com in DNS Lookup); |
| 25,434 | 2017/11/15 | 2024987 | ET TROJAN SunOrcal Reaver Domain Observed (weryhstui .com in DNS Lookup); |
| 25,433 | 2017/11/15 | 2024981 | ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1] |
| 25,432 | 2017/11/15 | 2024984 | ET TROJAN Win32/RCAP CnC Checkin; |
| 25,431 | 2017/11/15 | 2024988 | ET TROJAN SunOrcal Reaver Domain Observed (fyoutside .com in DNS Lookup); |
| 25,430 | 2017/11/15 | 2024989 | ET TROJAN SunOrcal Reaver Domain Observed (olinaodi .com in DNS Lookup); |
| 25,429 | 2017/11/15 | 2024982 | ET TROJAN DeepEnd Research Ransomware CrypMIC Payment Onion Domain; [1] |
| 25,428 | 2017/11/14 | 2405145 | ET CNC Shadowserver Reported CnC Server Port 54321 Group 1; [1,2] |
| 25,427 | 2017/11/14 | 2405146 | ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2] |
| 25,426 | 2017/11/14 | 2405144 | ET CNC Shadowserver Reported CnC Server Port 51987 Group 1; [1,2] |
| 25,425 | 2017/11/14 | 2405143 | ET CNC Shadowserver Reported CnC Server Port 47221 Group 1; [1,2] |
| 25,424 | 2017/11/14 | 2024980 | ET EXPLOIT Actiontec C1000A backdoor account; |
| 25,423 | 2017/11/14 | 2024979 | ET TROJAN Observed Malicious SSL Cert (IcedID CnC); [1] |
| 25,422 | 2017/11/11 | 2405141 | ET CNC Shadowserver Reported CnC Server Port 54321 Group 1; [1,2] |
| 25,421 | 2017/11/11 | 2405142 | ET CNC Shadowserver Reported CnC Server Port 65267 Group 1; [1,2] |
| 25,420 | 2017/11/11 | 2405140 | ET CNC Shadowserver Reported CnC Server Port 51987 Group 1; [1,2] |
| 25,419 | 2017/11/09 | 2024972 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 2; [1] |
| 25,418 | 2017/11/09 | 2024975 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 5; [1] |
| 25,417 | 2017/11/09 | 2024978 | ET INFO Browser Plugin Detect - Observed in Apple Phishing; |
| 25,416 | 2017/11/09 | 2024973 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 3; [1] |
| 25,415 | 2017/11/09 | 2024976 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 6; [1] |
| 25,414 | 2017/11/09 | 2024974 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 4; [1] |
| 25,413 | 2017/11/09 | 2024977 | ET ATTACK_RESPONSE 401TRG Perl DDoS IRCBot File Download; |
| 25,412 | 2017/11/09 | 2024971 | ET WEB_CLIENT pshell dl/execute primitives in wideb64 1; [1] |
| < 31 32 33 34 35 36 37 38 39 40 > |