text
stringlengths 0
383k
|
---|
WebAttackMaliciousRedirection30
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframes injected into webpages.
Additional Information
These iframes have style attribute set to hidden or height and width = 0 to remain invisible.
Affected
Microsoft Internet Explorer 5.0
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousRedirection32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframes injected into webpages.
Additional Information
These iframes have style attribute set to hidden or height and width = 0 to remain invisible.
Affected
Microsoft Internet Explorer 5.0
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousRedirection33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframes injected into webpages.
Additional Information
These iframes have style attribute set to hidden or height and width = 0 to remain invisible.
Affected
Microsoft Internet Explorer 5.0
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousRedirection34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousRedirection35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Malicious Redirection 36
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousRedirection38
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 39
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRedirection40
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection41
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection42
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 43
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 44
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection45
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection46
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 47
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection48
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection49
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Malicious Redirection 50
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection51
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection52
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection54
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 55
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 56
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 57
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 58
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 59
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Redirection 63
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 64
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection65
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection68
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 69
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Redirection 72
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 75
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 77
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc.
Affected
Various Browsers
|
Web Attack: Malicious Redirection 80
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection81
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 82
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 83
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 84
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 85
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 86
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 87
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection88
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 89
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirection9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Redirection 90
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 91
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 92
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 93
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 94
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 95
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 96
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 97
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 98
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
Web Attack: Malicious Redirection 99
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
You have attempted to visit a known malicious IP address. Visiting this web site could potentially put you at risk to becoming infected. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring. You should not have to take any additional actions and are safe from infection. It is recommended that you do NOT visit this site.
Additional Information
You have been prevented from accessing a known malicious IP address. It is recommended that you do NOT visit this site.
This protection prevents access to potentially malicious IP addresses that are known to be associated with malware, viruses, misleading applications such as fake antivirus or fake codecs. You should not have to take any additional actions as you have been prevented from visiting the malicious IP address. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
Users can be silently infected just by visiting a web site with attacks known as drive-by downloads or social engineering attacks where misleading applications can attempt to trick users into installing fake antivirus solutions or fake video players.
For more information on social engineering attacks using FakeAV, please see this information.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-101013-3606-99
Misleading applications intentionally misrepresent the security status of a computer. Misleading applications attempt to convince the user that he or she must remove potentially malware or security risks (usually nonexistent or fake) from the computer. The application will hold the user hostage by refusing to allow him or her to remove or fix the phantom problems until the 'required' software is purchased and installed. Misleading applications often look convincing - the programs may look like legitimate security programs and often have corresponding websites with user testimonials, lists of features, etc.
Affected
All Products
Response
No additional steps are needed. Symantec's Network Threat Protection solution has prevented any potential infection attempts from occurring.
|
WebAttackMaliciousRedirectionDNSChangerExploitKit
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousRedirectionDNSChangerExploitKit2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousRedirectionRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious redirection websites.
Additional Information
Compromised websites usually redirection of user through multiple domains before they are served with malicious content such as technical support scams, phishing pages, browser notification spam pages, etc.
This signature detects known malicious redirection scripts which helps protecting users from malicious content.
Affected
Various Operating Platforms
|
WebAttackMaliciousRMFFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to exploit a remote code execution vulnerability in Java while parsing malicious audio files.
Additional Information
Oracle Java SE and Java for Business are prone to a remote vulnerability. Specifically, the 'MixerSequencer' object fails to properly sanitize user-supplied data when parsing a crafted MIDI file.
Attackers can exploit this vulnerability to execute arbitrary code with the privileges of the user invoking the Java Runtime Environment (JRE). This issue may be exploited by enticing an unsuspecting user to view a crafted webpage; other vectors may exist targeting applications which use the affected class.
Affected
This vulnerability affects the following supported versions:
6 Update 18, 5.0 Update 23, 1.4.2_25, 1.3.1_27
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousRTFFiledownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousRTFFileDownload13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious files through HTTP requests.
Additional Information
Attacker uses various mechanisms to target a user system and conduct malicious activity.
Affected
Various platforms.
|
WebAttackMaliciousRTFFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an heap overrun vulnerability in RTF file format.
Additional Information
RTF files can be malformed to have inappropriate listoverride entries that can cause Heap Overrun.
Affected
Various Platforms
|
Web Attack: Malicious RTF File Download 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an heap overrun vulnerability in RTF file format.
Additional Information
RTF files can be malformed to have inappropriate listoverride entries that can cause Heap Overrun.
Affected
Various Platforms
|
WebAttackMaliciousRTFFileDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious files through HTTP requests.
Additional Information
Attacker uses various mechanisms to target a user system and conduct malicious activity.
Affected
Various platforms.
|
Web Attack: Malicious Scan Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Scan Request 10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Scan Request 11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
WebAttackMaliciousScanRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Scan Request 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Scan Request 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
WebAttackMaliciousScanRequest5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
WebAttackMaliciousScanRequest6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
WebAttackMaliciousScanRequest7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
WebAttackMaliciousScanRequest8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Scan Request 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability scan attempts.
Additional Information
Specific HTTP requests from scanning tool to determine whether the application running on the server is vulnerable.
Affected
Various OS platforms, Softwares.
Response
|
Web Attack: Malicious Script Detected 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Download 12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousScriptDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousScriptDownload28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Download 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer.
Additional Information
Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code.
If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com.
Affected
osCommerce osCommerce 2.1
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
Update your product definitions and perform a full system scan.
Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousScriptDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousScriptDownload51
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Download 52
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Script Download 53
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousScriptDownload54
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousScriptInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection10_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection12_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.