text
stringlengths
0
383k
Web Attack: Malicious Phishing Request 20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest24 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingRequest4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingRequest9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPhishingWebsite11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 24 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite26 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite30 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite32 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite34 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite35 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite36 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite37 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite38 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 39 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite40 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 41 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 43 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 44 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 45 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Phishing Website 46 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPhishingWebsite8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousPHPPayloadUpload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackMaliciousPHPScriptInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious PowerShell Script Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature is to detect W97M.Downloader activity. Additional Information W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails. The emails may have different subjects and body messages. For example: Subject: Outstanding invoices - [RANDOM LETTERS] Attachment: In[RANDOM LETTERS].doc Message: Kindly find attached our reminder and copy of the relevant invoices. Looking forward to receive your prompt payment and thank you in advance. Kind regards, [NAME] When the Word document is opened, the macro attempts to download and execute malware from a remote location. Affected Various Windows platforms
WebAttackMaliciousPowershellscriptdownload1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousPowerShellScriptDownload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
Web Attack: Malicious PowerShell Script Download 20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousPowerShellScriptDownload28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature is to detect W97M.Downloader activity. Additional Information W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails. The emails may have different subjects and body messages. For example: Subject: Outstanding invoices - [RANDOM LETTERS] Attachment: In[RANDOM LETTERS].doc Message: Kindly find attached our reminder and copy of the relevant invoices. Looking forward to receive your prompt payment and thank you in advance. Kind regards, [NAME] When the Word document is opened, the macro attempts to download and execute malware from a remote location. Affected Various Windows platforms
Web Attack: Malicious PowerShell Script Download 29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious PowerShell script on the machine. Additional Information Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine. Affected Various Windows Platforms. Response
WebAttackMaliciousProxyAuto-ConfigFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious Proxy Auto Config file on user's machine. Additional Information A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc. Affected Various Browsers. Response
Web Attack: Malicious Proxy Auto-Config File Download 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious Proxy Auto Config file on user's machine. Additional Information A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc. Affected Various Browsers. Response
WebAttackMaliciousProxyAuto-ConfigFileDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious Proxy Auto Config file on user's machine. Additional Information A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc. Affected Various Browsers. Response
WebAttackMaliciousQuicktimeMovieDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a QuickTime movie containing an external reference in attempt to exploit a vulnerability involving JavaScript code execution. Additional Information JS.Qspace is a JavaScript based worm that exploits an XSS vulnerability in the MySpace Web service. It also attempts to steal MySpace user credentials and modifies MySpace users profile in order to spread. Affected Quicktime Response Ensure that all patches have been applied to the system.
WebAttackMaliciousRedirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackMaliciousRedirection10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Malicious Redirection 100 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 101 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 102 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 103 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 104 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 105 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 106 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousRedirection15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackMaliciousRedirection17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackMaliciousRedirection18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
Web Attack: Malicious Redirection 22 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 23 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection24 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects W32.Spyrat activity on compromised machines. Additional Information W32.Spyrat is a worm that copies itself using removable drives and file-sharing networks. It also opens a back door on the computer. Affected Various Windows platform.
WebAttackMaliciousRedirection26 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection27 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection28 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection29 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.