text
stringlengths
0
383k
WebAttackMaliciousJavascriptWebsite27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMaliciousJavascriptWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousJavascriptWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Javascript Website 41 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 43 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 44 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 45 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMaliciousJavascriptWebsite46 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 47 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Malicious Javascript Website 48 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMaliciousJavascriptWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousJavascriptWebsite7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Javascript Website 8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousJavascriptWebsite9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousJNLPFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JNLP files. Additional Information JNLP file is a XML file that holds information on how to launch Java Web applications. Parameters such as JAR file location and CLASS file to be executed are found in the JNLP file. Majority of the times exploit kits use these JNLP files to run malicious JAVA files. Affected Various Browsers with Java installed.
WebAttackMaliciousJPEGImageDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious Images on user's system. Additional Information Malicious files can be downloaded on the user's system as image files. Affected various
WebAttackMaliciousJPEGImageDownloadRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious Images on user's system. Additional Information Malicious files can be downloaded on the user's system as image files. Affected various
WebAttackMaliciousJSDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackMaliciousJSDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackMaliciousJSDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackMaliciousJSDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackMaliciousMalvertismentRedirect4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
Web Attack: Malicious Nishang File Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious files through HTTP requests. Additional Information Attacker uses various mechanisms to target a user system and conduct malicious activity. Affected Various platforms.
WebAttackMaliciousOfficeFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious files through HTTP requests. Additional Information Attacker uses various mechanisms to target a user system and conduct malicious activity. Affected Various platforms.
Web Attack: Malicious OGNL Expression Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious OGNL expressions that can result in remote code execution. Additional Information OGNL expression can be used to get or set properties of Java object. OGNL expression can be used maliciously to execute arbitrary code on the target machine. Affected Various Apache Struts instances. Response
WebAttackMaliciousPayloadActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
WebAttackMaliciousPayloadActivity4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
Web Attack: Malicious Payload Activity 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
WebAttackMaliciousPayloadDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
WebAttackMaliciousPayloadDownload13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
WebAttackMaliciousPayloadDownload14 Severity:Low This attack poses a minor threat. Corrective action may not be possible or is not required. Description This signature detects Tcp Reverse shell activity Additional Information Tcp Reverse Shell is a testing tool to execute the commands from the remote location Affected All Windows Platforms Response
WebAttackMaliciousPayloadDownload17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPayloadDownload21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPayloadDownload24 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 26 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 30 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPayloadDownload32 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Download 33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPayloadDownload8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by penetration testing tools on the infected machine. Additional Information Penetration testing tools are software or programs used to assist penetration testing. Affected Various operating system platforms.
Web Attack: Malicious Payload Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPayloadUpload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload 9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload Activity 22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
Web Attack: Malicious Payload Upload Activity 23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPDFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature attempts to detect domains that are serving PDF files with embedded malicious malcode. Additional Information These domains are serving malicious PDF files that are attempting to exploit users. Affected All Windows
WebAttackMaliciousPDFDropper Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a Buffer Overflow Vulnerability in Foxit Reader. Additional Information Foxit Reader is a PDF viewer for Windows. The application is prone to multiple remote vulnerabilities when it parses PDF files: 1. Specially crafted JBIG2 symbol dictionary segments in a PDF file can dereference uninitialized memory. 2. An 'Open/Execute' action with an overly long filename argument in a PDF file can trigger a stack-based buffer overflow. 3. A security-bypass vulnerability occurs because the application performs actions defined in a PDF file without first presenting the user with a security warning. Attackers may leverage these issues to execute arbitrary code in the context of the application. Successful exploits may compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions. The issues affect Foxit Reader 3.0.2009.1301, 3.0, and 2.3. Other versions may also be affected. Affected Foxit Reader Response The vendor has released updates. Please see the references for more information.
WebAttackMaliciousPDFExploitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPDFFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
Web Attack: Malicious PDF File Download 15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
Web Attack: Malicious PDF File Download 17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in Nuance PDF Reader. Additional Information Nuance PDF Reader is a PDF document handling application for Microsoft Windows. Nuance PDF Reader is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. The issue occurs in 'pdfcore8.dll' when processing an excessively long string provided to the 'Launch' action object of the PDF file. An attacker can exploit this issue by enticing a user to open a malicious PDF file. Successful exploits may allow the attacker to execute arbitrary code or commands in the context of a user running the affected applications. Versions prior to Nuance PDF Reader 6.0 (Product ID: PD-1031-001-10472.1) are vulnerable. Affected Nuance PDF Reader
WebAttackMaliciousPDFFileDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackMaliciousPDFFileDownload6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownload7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousPDFFileDownload8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious PDF File Download 9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownloadRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems. Additional Information This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems. Affected Adobe Reader Response Ensure all patches have been applied for Adobe Acrobat reader.
WebAttackMaliciousPDFFileDownloadRequest3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is a multimedia application for multiple platforms. Adobe Flash Player is prone to a remote memory-corruption vulnerability. Specifically, the issue is triggered when handling a malicious '.swf' file embedded in a Microsoft Word '.doc', '.pdf' files etc. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Various Adobe Flash Player version Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
WebAttackMaliciousPhishingRedirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.