text
stringlengths 0
383k
|
---|
WebAttackMaliciousScriptInjection13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection13_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Injection 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptInjection7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Redirection 13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Redirection 15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptRedirection15_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
WebAttackMaliciousScriptRedirection16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to inject malicious scripts into the website.
Additional Information
Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website.
Affected
Various platforms.
Response
|
Web Attack: Malicious Script Redirection 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Redirection 5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Script Redirection 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
Web Attack: Malicious Serialized Object Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious serialized objects.
Additional Information
Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Serialized Object Upload 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious serialized objects.
Additional Information
Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Serialized Object Upload 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious serialized objects.
Additional Information
Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code.
Affected
Various platforms.
Response
|
WebAttackMaliciousShellScriptDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
Web Attack: Malicious Shell Script Download 12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
Web Attack: Malicious Shell Script Download 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousShellScriptDownload9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousSilverlightDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousSilverlightFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits and payloads from Angler exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Angler is an exploit kit that allows the remote attacker to perform various malicious actions on the compromised computer. Angler Exploit Kit commonly checks to see if the PC is having some AV software and has IE, Java or Flash vulnerable. If Angler Exploit Kit finds some AV software installed on computer it avoids dropping the exploit and payload.
This exploit kit is known for dropping cryptolocker, Powliks, bedep etc payload, if attack is successful.
Affected
Various Windows platform
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousSWFCVE-2015-0336
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFDownload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is an application for playing Flash media files.
Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations.
An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application.
Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0.
Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design.
Affected
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
Response
The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
|
WebAttackMaliciousSWFDownload16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is an application for playing Flash media files.
Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations.
An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application.
Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0.
Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design.
Affected
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
Response
The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
|
WebAttackMaliciousSWFDownload17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFDownload23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFDownload24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Redkit toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Redkit Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
|
WebAttackMaliciousSWFDownload27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
Web Attack: Malicious SWF Download 30
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousSWFDownload34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload36
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload39
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is an application for playing Flash media files.
Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations.
An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application.
Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0.
Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design.
Affected
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
Response
The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
|
WebAttackMaliciousSWFDownload40
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload43
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is an application for playing Flash media files.
Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations.
An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application.
Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0.
Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design.
Affected
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
Response
The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
|
WebAttackMaliciousSWFDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is a multimedia application for Microsoft Windows, Mozilla, and Apple technologies.
Adobe Flash Player is prone to a remote code-execution vulnerability that occurs because of an integer underflow error.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Various Adobe Flash Player versions.
|
WebAttackMaliciousSWFDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackMaliciousSWFDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFDownload9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash
|
WebAttackMaliciousSWFDownloadCVE-2012-1535
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.
Additional Information
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Various
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousSWFDownloadCVE-2012-15352
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution.
Additional Information
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Various
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousSWFFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is an application for playing Flash media files.
Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations.
An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application.
Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0.
Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design.
Affected
Adobe Flash Player 9.0.115.0 and earlier versions are affected.
Response
The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
|
WebAttackMaliciousSWFFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious SWF files that comes as part of standalone exploits or exploit toolkits.
Additional Information
SWF files can be used ancillary with exploits which helps the attackers to setup the shellcode in the higher memory addresses.
Affected
Various Web Browsers
|
WebAttackMaliciousSWFFileDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious SWF files that comes as part of standalone exploits or exploit toolkits.
Additional Information
SWF files can be used ancillary with exploits which helps the attackers to setup the shellcode in the higher memory addresses.
Affected
Various Web Browsers
|
WebAttackMaliciousSWFRedirection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability.
Additional Information
Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function.
Affected
Adobe Flash Player various versions
|
WebAttackMaliciousSWFRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousThemeorPluginDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousThemeorPluginDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousThemeorPluginDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousThemeorPluginDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousToolkitActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitActivity3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activity on the host machine
Additional Information
This signature detects malicious activity on the host machine
Affected
Various
Response
NA
|
WebAttackMaliciousToolkitDownloadAttack4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitIframeInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer.
Additional Information
Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code.
If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com.
Affected
osCommerce osCommerce 2.1
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousToolKitIframeInjection3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer.
Additional Information
Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code.
If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com.
Affected
osCommerce osCommerce 2.1
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackMaliciousToolKitIframeInjection4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer.
Additional Information
Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code.
If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com.
Affected
osCommerce osCommerce 2.1
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackMaliciousToolkitIframeInjection6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousToolkitIframeInjection7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousToolkitIframeInjection8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousToolkitIframeInjection9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousToolkitRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
WebAttackMaliciousToolkitRedirect2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
WebAttackMaliciousToolkitRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.