text
stringlengths
0
383k
WebAttackMaliciousRedirection30 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframes injected into webpages. Additional Information These iframes have style attribute set to hidden or height and width = 0 to remain invisible. Affected Microsoft Internet Explorer 5.0 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousRedirection32 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframes injected into webpages. Additional Information These iframes have style attribute set to hidden or height and width = 0 to remain invisible. Affected Microsoft Internet Explorer 5.0 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousRedirection33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframes injected into webpages. Additional Information These iframes have style attribute set to hidden or height and width = 0 to remain invisible. Affected Microsoft Internet Explorer 5.0 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousRedirection34 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousRedirection35 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Malicious Redirection 36 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 37 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousRedirection38 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 39 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRedirection40 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection41 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection42 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 43 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 44 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection45 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection46 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 47 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection48 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection49 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Malicious Redirection 50 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection51 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection52 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection54 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 55 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 56 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 57 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 58 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 59 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Redirection 63 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 64 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection65 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection68 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 69 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Redirection 72 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 75 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 77 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Malicious Redirection 80 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection81 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 82 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 83 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 84 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 85 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 86 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 87 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection88 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 89 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirection9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Redirection 90 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 91 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 92 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 93 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 94 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 95 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 96 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 97 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 98 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Web Attack: Malicious Redirection 99 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site. Additional Information You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site. This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players. For more information on social engineering attacks using FakeAV, please see this information. http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99 Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc. Affected All Products Response No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
WebAttackMaliciousRedirectionDNSChangerExploitKit Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousRedirectionDNSChangerExploitKit2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousRedirectionRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious redirection websites. Additional Information Compromised websites usually redirection of user through multiple domains before they are served with malicious content such as technical support scams, phishing pages, browser notification spam pages, etc. This signature detects known malicious redirection scripts which helps protecting users from malicious content. Affected Various Operating Platforms
WebAttackMaliciousRMFFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to exploit a remote code execution vulnerability in Java while parsing malicious audio files. Additional Information Oracle Java SE and Java for Business are prone to a remote vulnerability. Specifically, the 'MixerSequencer' object fails to properly sanitize user-supplied data when parsing a crafted MIDI file. Attackers can exploit this vulnerability to execute arbitrary code with the privileges of the user invoking the Java Runtime Environment (JRE). This issue may be exploited by enticing an unsuspecting user to view a crafted webpage; other vectors may exist targeting applications which use the affected class. Affected This vulnerability affects the following supported versions: 6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27 Response Updates are available. Please see the references for more information.
WebAttackMaliciousRTFFiledownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousRTFFileDownload13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious files through HTTP requests. Additional Information Attacker uses various mechanisms to target a user system and conduct malicious activity. Affected Various platforms.
WebAttackMaliciousRTFFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an heap overrun vulnerability in RTF file format. Additional Information RTF files can be malformed to have inappropriate listoverride entries that can cause Heap Overrun. Affected Various Platforms
Web Attack: Malicious RTF File Download 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an heap overrun vulnerability in RTF file format. Additional Information RTF files can be malformed to have inappropriate listoverride entries that can cause Heap Overrun. Affected Various Platforms
WebAttackMaliciousRTFFileDownload7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious files through HTTP requests. Additional Information Attacker uses various mechanisms to target a user system and conduct malicious activity. Affected Various platforms.
Web Attack: Malicious Scan Request Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Scan Request 10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Scan Request 11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
WebAttackMaliciousScanRequest2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Scan Request 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Scan Request 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
WebAttackMaliciousScanRequest5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
WebAttackMaliciousScanRequest6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
WebAttackMaliciousScanRequest7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
WebAttackMaliciousScanRequest8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Scan Request 9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects vulnerability scan attempts. Additional Information Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable. Affected Various OS platforms, Softwares. Response
Web Attack: Malicious Script Detected 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Download 12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousScriptDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousScriptDownload28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Download 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer. Additional Information Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code. If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com. Affected osCommerce osCommerce 2.1 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. Update your product definitions and perform a full system scan. Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousScriptDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousScriptDownload51 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious JavaScript downloaded from the websites. Additional Information Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer. Affected Various platforms. Response
Web Attack: Malicious Script Download 52 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Script Download 53 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousScriptDownload54 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousScriptInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection10_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection12_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response