text
stringlengths
0
383k
WebAttackMaliciousToolkitRequest4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest45 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest47 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitRequest9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariant Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariant29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariant3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitVariant30 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariant4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitVariantActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitVariantActivity15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantActivity20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantActivity22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantActivity24 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantActivity3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activity on the host machine Additional Information This signature detects malicious activity on the host machine Affected Various Response NA
WebAttackMaliciousToolkitVariantActivity6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitVariantActivity97 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantActivity98 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitVariantDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a XPLload toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities. Affected various
WebAttackMaliciousToolkitWebsite12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Toolkit Website 14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitWebsite25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitWebsite26 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Java Exploits Toolkit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite37 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitWebsite38 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various platforms
WebAttackMaliciousToolkitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite46 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite47 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite48 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite49 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousToolkitWebsite8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackMaliciousToolkitWebsite9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousUnicornFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download malicious files through HTTP requests. Additional Information Attacker uses various mechanisms to target a user system and conduct malicious activity. Affected Various platforms.
WebAttackMaliciousURLRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousURLRequest2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousURLRequest21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousVBScriptDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit machine through malicious VBScript. Additional Information Malicious VBScript when executed will download other exploits on to the machine. This can compromise the machine. Affected Various Windows Platforms.
Web Attack: Malicious VBScript Website Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit machine through malicious VBScript. Additional Information Malicious VBScript when executed will download other exploits on to the machine. This can compromise the machine. Affected Various Windows Platforms.
Web Attack: Malicious Web Shell Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebShellActivity9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious shell script on the machine. Additional Information Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code. Affected Various version of Unix and Linux machines.
WebAttackMaliciousWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteAccessed Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
Web Attack: Malicious Website Accessed 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteAccessed3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteAccessed4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteAccessed5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteAccessed6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteAccessed7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to access a known malicious website. Additional Information This signature detect attempts to access a known malicious website. Affected Windows
WebAttackMaliciousWebsiteActivity40 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity43 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity44 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity46 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity47 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity48 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity49 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity50 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity51 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity52 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity53 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity54 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity55 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity56 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity57 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity58 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity59 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects phishing websites. Additional Information Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes. Affected Various Platforms. Response
WebAttackMaliciousWebsiteActivity_100 Severity:Low This attack poses a minor threat. Corrective action may not be possible or is not required. Description This signature detects RDP Bruteforce attack. Additional Information Attackers/Malwares use RDP protocol to bruteforce and gain access to machines. Once access is obtained they proceed to steal or destroy data. Affected Various Windows Platforms. Response Unless otherwise known, any unintended RDP communication in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication. If you want to block this traffic, refer following link: https://knowledge.broadcom.com/external/article/176042/about-endpoint-protection-audit-signatur.html
WebAttackMaliciousWebsiteActivity_22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_32 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousWebsiteActivity_34 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Backdoor Trojan activity on the compromised computer. Additional Information Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various Windows platforms
WebAttackMaliciousWebsiteActivity_35 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousWebsiteActivity_36 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousWebsiteActivity_39 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_41 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_42 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response