text
stringlengths 0
383k
|
---|
Web Attack: Malicious Phishing Request 20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingWebsite11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite26
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite30
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite36
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite38
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 39
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite40
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 41
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 43
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 44
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 45
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Phishing Website 46
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingWebsite8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPHPPayloadUpload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPHPScriptInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious PowerShell Script Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature is to detect W97M.Downloader activity.
Additional Information
W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails.
The emails may have different subjects and body messages. For example:
Subject: Outstanding invoices - [RANDOM LETTERS]
Attachment: In[RANDOM LETTERS].doc
Message:
Kindly find attached our reminder and copy of the relevant invoices.
Looking forward to receive your prompt payment and thank you in advance.
Kind regards,
[NAME]
When the Word document is opened, the macro attempts to download and execute malware from a remote location.
Affected
Various Windows platforms
|
WebAttackMaliciousPowershellscriptdownload1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPowerShellScriptDownload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
Web Attack: Malicious PowerShell Script Download 20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousPowerShellScriptDownload28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature is to detect W97M.Downloader activity.
Additional Information
W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails.
The emails may have different subjects and body messages. For example:
Subject: Outstanding invoices - [RANDOM LETTERS]
Attachment: In[RANDOM LETTERS].doc
Message:
Kindly find attached our reminder and copy of the relevant invoices.
Looking forward to receive your prompt payment and thank you in advance.
Kind regards,
[NAME]
When the Word document is opened, the macro attempts to download and execute malware from a remote location.
Affected
Various Windows platforms
|
Web Attack: Malicious PowerShell Script Download 29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PowerShell script on the machine.
Additional Information
Malicious PowerShell scripts when run on the machine can install backdoor, download and install additional malware and compromise the machine.
Affected
Various Windows Platforms.
Response
|
WebAttackMaliciousProxyAuto-ConfigFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious Proxy Auto Config file on user's machine.
Additional Information
A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc.
Affected
Various Browsers.
Response
|
Web Attack: Malicious Proxy Auto-Config File Download 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious Proxy Auto Config file on user's machine.
Additional Information
A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc.
Affected
Various Browsers.
Response
|
WebAttackMaliciousProxyAuto-ConfigFileDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious Proxy Auto Config file on user's machine.
Additional Information
A Proxy Auto Config file as known as PAC file determines how browsers automatically choose a proxy server based on URL, User-Agent etc. Malicious PAC files can hijack user's browser and redirect them to malicious websites which steal credentials, identity etc.
Affected
Various Browsers.
Response
|
WebAttackMaliciousQuicktimeMovieDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a QuickTime movie containing an external reference in attempt to exploit a vulnerability involving JavaScript code execution.
Additional Information
JS.Qspace is a JavaScript based worm that exploits an XSS vulnerability in the MySpace Web service. It also attempts to steal MySpace user credentials and modifies MySpace users profile in order to spread.
Affected
Quicktime
Response
Ensure that all patches have been applied to the system.
|
WebAttackMaliciousRedirection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc.
Affected
Various Browsers
|
WebAttackMaliciousRedirection10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Malicious Redirection 100
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 101
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 102
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 103
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 104
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 105
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 106
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousRedirection15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc.
Affected
Various Browsers
|
WebAttackMaliciousRedirection17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc.
Affected
Various Browsers
|
WebAttackMaliciousRedirection18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
Web Attack: Malicious Redirection 22
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 23
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection24
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects W32.Spyrat activity on compromised machines.
Additional Information
W32.Spyrat is a worm that copies itself using removable drives and file-sharing networks. It also opens a back door on the computer.
Affected
Various Windows platform.
|
WebAttackMaliciousRedirection26
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection27
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection28
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection29
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.