text
stringlengths
0
383k
WebAttackMaliciousScriptInjection13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection13_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Injection 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptInjection7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Redirection 13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Redirection 15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptRedirection15_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
WebAttackMaliciousScriptRedirection16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to inject malicious scripts into the website. Additional Information Hackers use tools to exploit various vulnerabilities in CMS sites like WordPress, Joomla, etc.. to inject malicious code into existing pages on the website. Affected Various platforms. Response
Web Attack: Malicious Script Redirection 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Redirection 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
Web Attack: Malicious Script Redirection 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
Web Attack: Malicious Serialized Object Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious serialized objects. Additional Information Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code. Affected Various platforms. Response
Web Attack: Malicious Serialized Object Upload 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious serialized objects. Additional Information Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code. Affected Various platforms. Response
Web Attack: Malicious Serialized Object Upload 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious serialized objects. Additional Information Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code. Affected Various platforms. Response
WebAttackMaliciousShellScriptDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
Web Attack: Malicious Shell Script Download 12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
Web Attack: Malicious Shell Script Download 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousShellScriptDownload9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousSilverlightDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousSilverlightFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits and payloads from Angler exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Angler is an exploit kit that allows the remote attacker to perform various malicious actions on the compromised computer. Angler Exploit Kit commonly checks to see if the PC is having some AV software and has IE, Java or Flash vulnerable. If Angler Exploit Kit finds some AV software installed on computer it avoids dropping the exploit and payload. This exploit kit is known for dropping cryptolocker, Powliks, bedep etc payload, if attack is successful. Affected Various Windows platform Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousSWFCVE-2015-0336 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFDownload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is an application for playing Flash media files. Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations. An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application. Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Flash Player 9.0.115.0 and earlier versions are affected. NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0. Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design. Affected Adobe Flash Player 9.0.115.0 and earlier versions are affected. Response The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
WebAttackMaliciousSWFDownload16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is an application for playing Flash media files. Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations. An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application. Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Flash Player 9.0.115.0 and earlier versions are affected. NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0. Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design. Affected Adobe Flash Player 9.0.115.0 and earlier versions are affected. Response The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
WebAttackMaliciousSWFDownload17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFDownload23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFDownload24 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Redkit toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Redkit Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers
WebAttackMaliciousSWFDownload27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
Web Attack: Malicious SWF Download 30 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousSWFDownload34 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload35 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload36 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload37 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload39 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is an application for playing Flash media files. Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations. An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application. Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Flash Player 9.0.115.0 and earlier versions are affected. NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0. Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design. Affected Adobe Flash Player 9.0.115.0 and earlier versions are affected. Response The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
WebAttackMaliciousSWFDownload40 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload43 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is an application for playing Flash media files. Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations. An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application. Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Flash Player 9.0.115.0 and earlier versions are affected. NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0. Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design. Affected Adobe Flash Player 9.0.115.0 and earlier versions are affected. Response The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
WebAttackMaliciousSWFDownload6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is a multimedia application for Microsoft Windows, Mozilla, and Apple technologies. Adobe Flash Player is prone to a remote code-execution vulnerability that occurs because of an integer underflow error. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Various Adobe Flash Player versions.
WebAttackMaliciousSWFDownload7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackMaliciousSWFDownload8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFDownload9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash
WebAttackMaliciousSWFDownloadCVE-2012-1535 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution. Additional Information An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Various Response Updates are available. Please see the references for more information.
WebAttackMaliciousSWFDownloadCVE-2012-15352 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Adobe Flash Player which may result in remote code execution. Additional Information An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Various Response Updates are available. Please see the references for more information.
WebAttackMaliciousSWFFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is an application for playing Flash media files. Flash Player is prone to a remote buffer-overflow vulnerability when processing SWF files with the 'DefineSceneAndFrameLabelData' tag (tag ID 0x56). The issue stems from an integer overflow when calculating pointers. Attackers can use this issue to write to arbitrary memory locations. An attacker can exploit the issue by enticing an unsuspecting victim to open a specially crafted multimedia file with the vulnerable application. Successful exploits will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Adobe Flash Player 9.0.115.0 and earlier versions are affected. NOTE: This issue has been fixed in all versions of Adobe Flash Player 9.0.124.0. Initial investigations suggested that the vulnerability had not been patched in the standalone Adobe Flash Player version 9.0.124.0 for Linux and the standalone Adobe Flash Player version 9.0.124.0 with debug capabilities for Microsoft Windows. The observed behavior that led to this initial conclusion has since been confirmed by Adobe as intended by design. Affected Adobe Flash Player 9.0.115.0 and earlier versions are affected. Response The vendor released Flash Player 9.0.124.0 to address this issue. Please see the references for more information.
WebAttackMaliciousSWFFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious SWF files that comes as part of standalone exploits or exploit toolkits. Additional Information SWF files can be used ancillary with exploits which helps the attackers to setup the shellcode in the higher memory addresses. Affected Various Web Browsers
WebAttackMaliciousSWFFileDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious SWF files that comes as part of standalone exploits or exploit toolkits. Additional Information SWF files can be used ancillary with exploits which helps the attackers to setup the shellcode in the higher memory addresses. Affected Various Web Browsers
WebAttackMaliciousSWFRedirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adobe Flash files which may contain malicious code exploiting a vulnerability. Additional Information Adobe Flash file format used for multimedia, vector graphics and ActionScript. SWF files can contain animations or applets of varying degrees of interactivity and function. Affected Adobe Flash Player various versions
WebAttackMaliciousSWFRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousThemeorPluginDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousThemeorPluginDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousThemeorPluginDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousThemeorPluginDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousToolkitActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitActivity3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activity on the host machine Additional Information This signature detects malicious activity on the host machine Affected Various Response NA
WebAttackMaliciousToolkitDownloadAttack4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitIframeInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer. Additional Information Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code. If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com. Affected osCommerce osCommerce 2.1 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackMaliciousToolKitIframeInjection3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer. Additional Information Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code. If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com. Affected osCommerce osCommerce 2.1 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackMaliciousToolKitIframeInjection4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a mass injection attack which may redirect to a malicious website that can compromise the target computer. Additional Information Web sites have been hit by a mass-compromise attack that injects malware into pages and redirects victims to a site that will then try to download Trojans and keylogger code. If a user visits one of the infected sites, they are redirected through a series of different sites owned by the attacker and brought to the final landing page containing the exploit code . The final landing page records the visitor's IP address. When visited for the first time, the user is directed to the exploit payload site. But when visited again from the same IP address, the user is directed to the benign site of ask.com. Affected osCommerce osCommerce 2.1 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackMaliciousToolkitIframeInjection6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousToolkitIframeInjection7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousToolkitIframeInjection8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousToolkitIframeInjection9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousToolkitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
WebAttackMaliciousToolkitRedirect2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
WebAttackMaliciousToolkitRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.