| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 
| 20,611 | 2015/03/06 |  2020617  |  ET POLICY DNS Query to .onion Proxy Domain (connect2tor.org);   | 
| 20,610 | 2015/03/06 |  2020614  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 55; [1,2]  | 
| 20,609 | 2015/03/06 |  2020611  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 52; [1,2]  | 
| 20,608 | 2015/03/06 |  2020609  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 50; [1,2]  | 
| 20,607 | 2015/03/06 |  2020615  |  ET TROJAN Teerac/CryptoFortress .onion Proxy Domain (3v6e2oe5y5ruimpe);   | 
| 20,606 | 2015/03/06 |  2020612  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 53; [1,2]  | 
| 20,605 | 2015/03/06 |  2020610  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 51; [1,2]  | 
| 20,604 | 2015/03/06 |  2020607  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 48; [1,2]  | 
| 20,603 | 2015/03/06 |  2020605  |  ET CURRENT_EVENTS - WindowBase64.atob Function In Edwards Packed JavaScript, Possible iFrame Injection Detected; [1]  | 
| 20,602 | 2015/03/06 |  2020606  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 47; [1,2]  | 
| 20,601 | 2015/03/06 |  2020608  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 49; [1,2]  | 
| 20,600 | 2015/03/05 |  2020599  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (20);   | 
| 20,599 | 2015/03/05 |  2020598  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (19);   | 
| 20,598 | 2015/03/05 |  2020602  |  ET TROJAN LogPOS Sending Data; [1]  | 
| 20,597 | 2015/03/05 |  2020601  |  ET TROJAN Agent.bnrb Retrieving DLL;   | 
| 20,596 | 2015/03/05 |  2020600  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (21);   | 
| 20,595 | 2015/03/05 |  2020604  |  ET CURRENT_EVENTS Likely Blackhole eval haha; [1]  | 
| 20,594 | 2015/03/05 |  2020603  |  ET EXPLOIT D-Link and TRENDnet ncc2 Service Vulnerability (fwupdate.cpp) 2015-1187; [1]  | 
| 20,593 | 2015/03/05 |  2020588  |  ET CURRENT_EVENTS Possible Scam - FakeAV Alert Landing March 2 2015;   | 
| 20,592 | 2015/03/05 |  2020597  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (18);   | 
| 20,591 | 2015/03/05 |  2020594  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (15);   | 
| 20,590 | 2015/03/05 |  2020591  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (12);   | 
| 20,589 | 2015/03/05 |  2020596  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (17);   | 
| 20,588 | 2015/03/05 |  2020595  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (16);   | 
| 20,587 | 2015/03/05 |  2020589  |  ET CURRENT_EVENTS Possible Scam - FakeAV Alert Landing March 2 2015;   | 
| 20,586 | 2015/03/05 |  2020590  |  ET EXPLOIT D-Link and TRENDnet ncc2 Service Vulnerability (ping.ccp) 2015-1187; [1]  | 
| 20,585 | 2015/03/05 |  2020592  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (13);   | 
| 20,584 | 2015/03/05 |  2020593  |  ET CURRENT_EVENTS Angler EK XTEA encrypted binary (14);   | 
| 20,583 | 2015/03/05 |  2020587  |  ET CURRENT_EVENTS Possible Scam - FakeAV Alert Request March 2 2015;   | 
| 20,582 | 2015/03/05 |  2020586  |  ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 46; [1,2]  | 
| 20,581 | 2015/03/04 |  2020585  |  ET EXPLOIT PCMan FTP Server 2.0.7 Remote Command Execution; [1]  | 
| 20,580 | 2015/03/04 |  2020583  |  ET EXPLOIT Seagate Business NAS Unauthenticated Remote Command Execution; [1]  | 
| 20,579 | 2015/03/04 |  2020582  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (CryptoLocker CnC); [1]  | 
| 20,578 | 2015/03/04 |  2020584  |  ET CURRENT_EVENTS Sweet Orange EK Flash Exploit IE March 03 2015;   | 
| 20,577 | 2015/02/28 |  2020581  |  ET TROJAN Chanitor .onion Proxy Domain;   | 
| 20,576 | 2015/02/28 |  2020578  |  ET POLICY Privdog Activation; [1,2]  | 
| 20,575 | 2015/02/28 |  2020580  |  ET POLICY Privdog Update check; [1,2]  | 
| 20,574 | 2015/02/28 |  2020579  |  ET POLICY Privdog Checkin; [1,2]  | 
| 20,573 | 2015/02/26 |  2020568  |  ET TROJAN Tinba Checkin 3;   | 
| 20,572 | 2015/02/26 |  2020569  |  ET TROJAN Unknown Trojan Downloading PE via MSSQL Connection to Non-Standard Port;   | 
| 20,571 | 2015/02/26 |  2020565  |  ET POLICY Dropbox DNS Lookup - Possible Offsite File Backup in Use; [1]  | 
| 20,570 | 2015/02/26 |  2020570  |  ET CURRENT_EVENTS KaiXin Secondary Landing Page;   | 
| 20,569 | 2015/02/26 |  2020566  |  ET TROJAN Netwire RAT Client HeartBeat;   | 
| 20,568 | 2015/02/26 |  2020560  |  ET CURRENT_EVENTS DRIVEBY [PwC CTD] -- MultiGroup - ScanBox and Targetted Watering Holes ActiveX Call; [1]  | 
| 20,567 | 2015/02/26 |  2020572  |  ET WEB_SERVER WebShell - ASPyder - File Create - POST Structure;   | 
| 20,566 | 2015/02/26 |  2020552  |  ET ATTACK_RESPONSE Ingres error in HTTP response, possible SQL injection point;   | 
| 20,565 | 2015/02/26 |  2020559  |  ET CURRENT_EVENTS DRIVEBY [PwC CTD] -- MultiGroup - ScanBox Watering Hole iframe; [1]  | 
| 20,564 | 2015/02/26 |  2020558  |  ET CURRENT_EVENTS DRIVEBY [PwC CTD] -- MultiGroup - ScanBox and Targetted Watering Holes PDF; [1]  | 
| 20,563 | 2015/02/26 |  2020567  |  ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC); [1]  | 
| 20,562 | 2015/02/26 |  2020555  |  ET WEB_SERVER ATTACKER WebShell - Weevely - Downloaded;   | 
| < 131  132  133  134  135  136  137  138  139  140 > |