text
stringlengths 0
383k
|
---|
WebAttackMaliciousToolkitRequest4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest45
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest47
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitRequest9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariant
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariant29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariant3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitVariant30
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariant4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitVariantActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitVariantActivity15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantActivity20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantActivity22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantActivity24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantActivity3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activity on the host machine
Additional Information
This signature detects malicious activity on the host machine
Affected
Various
Response
NA
|
WebAttackMaliciousToolkitVariantActivity6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitVariantActivity97
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantActivity98
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitVariantDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a XPLload toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detects attempts to download exploits from a Eleonore toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
various
|
WebAttackMaliciousToolkitWebsite12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Toolkit Website 14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitWebsite25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitWebsite26
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Java Exploits Toolkit is a attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitWebsite38
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Toolkits contain various exploits bundled into a single package.Victim on visiting the server hosting the malicious toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various platforms
|
WebAttackMaliciousToolkitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite46
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite47
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite48
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite49
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousToolkitWebsite8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackMaliciousToolkitWebsite9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousUnicornFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious files through HTTP requests.
Additional Information
Attacker uses various mechanisms to target a user system and conduct malicious activity.
Affected
Various platforms.
|
WebAttackMaliciousURLRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousURLRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousURLRequest21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousVBScriptDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit machine through malicious VBScript.
Additional Information
Malicious VBScript when executed will download other exploits on to the machine. This can compromise the machine.
Affected
Various Windows Platforms.
|
Web Attack: Malicious VBScript Website
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit machine through malicious VBScript.
Additional Information
Malicious VBScript when executed will download other exploits on to the machine. This can compromise the machine.
Affected
Various Windows Platforms.
|
Web Attack: Malicious Web Shell Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebShellActivity9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious shell script on the machine.
Additional Information
Shell Scripts are list of linux commands contained within a file. When run the shell can read this file and execute each of the commands one after another. Malicious shell script files can compromise the security of the computer by downloading and executing malicious code.
Affected
Various version of Unix and Linux machines.
|
WebAttackMaliciousWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteAccessed
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
Web Attack: Malicious Website Accessed 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteAccessed3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteAccessed4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteAccessed5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteAccessed6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteAccessed7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to access a known malicious website.
Additional Information
This signature detect attempts to access a known malicious website.
Affected
Windows
|
WebAttackMaliciousWebsiteActivity40
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity43
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity44
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity46
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity47
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity48
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity49
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity50
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity51
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity52
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity53
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity54
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity55
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity56
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity57
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity58
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity59
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousWebsiteActivity_100
Severity:Low
This attack poses a minor threat. Corrective action may not be possible or is not required.
Description
This signature detects RDP Bruteforce attack.
Additional Information
Attackers/Malwares use RDP protocol to bruteforce and gain access to machines. Once access is obtained they proceed to steal or destroy data.
Affected
Various Windows Platforms.
Response
Unless otherwise known, any unintended RDP communication in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication.
If you want to block this traffic, refer following link:
https://knowledge.broadcom.com/external/article/176042/about-endpoint-protection-audit-signatur.html
|
WebAttackMaliciousWebsiteActivity_22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousWebsiteActivity_34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Backdoor Trojan activity on the compromised computer.
Additional Information
Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various Windows platforms
|
WebAttackMaliciousWebsiteActivity_35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousWebsiteActivity_36
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousWebsiteActivity_39
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_41
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.