text
stringlengths 0
383k
|
---|
WebAttackMaliciousWebsiteActivity_43
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousWebsiteActivity_44
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc.
Affected
Various Browsers
|
WebAttackMaliciousWebsiteActivity_45
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_46
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_47
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_48
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_49
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_50
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Trojan.Spymel activity on the compromised hosts when it trying to connect back to control server.
Additional Information
This signature detects Trojan.Spymel activity on the compromised hosts when it trying to connect back to control server.
Affected
Windows
|
WebAttackMaliciousWebsiteActivity_69
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Backdoor Trojan activity on the compromised computer.
Additional Information
Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various Windows platforms
|
WebAttackMaliciousWebsiteActivity_70
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_71
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_72
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Infostealer activity on the infected machine that could result in the downloading and executing of files from the Internet on a compromised host.
Additional Information
Infostealers are malwares that steals information on the compromised computer and also downloads and executes files from the Internet.
Affected
Various Windows platforms
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
Disable System Restore (Windows Me/XP).
Update the virus definitions.
Restart the computer in Safe mode or Safe mode with Command Prompt.
Run a full system scan.
Delete any values added to the registry.
|
WebAttackMaliciousWebsiteActivity_73
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature is to detect W97M.Downloader activity.
Additional Information
W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails.
The emails may have different subjects and body messages. For example:
Subject: Outstanding invoices - [RANDOM LETTERS]
Attachment: In[RANDOM LETTERS].doc
Message:
Kindly find attached our reminder and copy of the relevant invoices.
Looking forward to receive your prompt payment and thank you in advance.
Kind regards,
[NAME]
When the Word document is opened, the macro attempts to download and execute malware from a remote location.
Affected
Various Windows platforms
|
WebAttackMaliciousWebsiteActivity_74
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_75
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteActivity_78
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Trojan.Mdropper activity on compromised machines.
Additional Information
Trojan.Mdropper is a type of Trojan whose purpose is to deliver an enclosed payload onto a destination host computer. A dropper is a means to an end rather than the end itself. In other words, the dropper is usually used at the start or in the early stages of a malware attack.
Affected
Various Windows platform.
|
WebAttackMaliciousWebsiteActivity_79
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMaliciousWebsiteActivity_81
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Android.Trojan activity in compromised device.
Additional Information
Android.Trojan is a trojan horse that acts as agent in compromised device that can run several malicious activities and open backdoor to attacker.
Affected
Android
|
WebAttackMaliciousWebsiteActivity_82
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects traffic generated by Downloader.Ponik which may lead to further infection of the affected system.
Additional Information
The Trojan may arrive through spam email.
When the Trojan is executed, it may create the following files:
%TEMP%\[RANDOM CHARACTERS FILE NAME].bat
%UserProfile%\Local Settings\Application Data\pny\pnd.exe
The Trojan then creates the following registry entry so that it executes whenever Windows starts: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Microsoft PnD" = "%UserProfile%\Local Settings\Application Data\pny\pnd.exe"
It also creates the following registry entries:
HKEY_CURRENT_USER\Software\WinRAR\"Client Hash" = "[RANDOM HEXADECIMAL CHARACTERS]"
HKEY_CURRENT_USER\Software\WinRAR\"HWID" = "[RANDOM HEXADECIMAL CHARACTERS]"
The Trojan may then connect to any of the following remote locations:
91.231.156.36
[http://]2.enzofavata.com/forum/viewto[REMOVED]
[http://]2.sardiniaexport.com/forum/viewto[REMOVED]
[http://]222119966122.su/clou[REMOVED]
[http://]4.pianetapollo.com/ponyb/gate[REMOVED]
[http://]4.professionalsoft.com/ponyb/gate[REMOVED]
[http://]6.grapaimport.com/ponyb/gate[REMOVED]
[http://]6.grapainterfood.com/ponyb/gate[REMOVED]
[http://]atdsupdate.in/all/old[REMOVED]
[http://]banderbon.cz.cc/file/local/tool[REMOVED]
[http://]bestinsighttours.com/bZ6[REMOVED]
[http://]fokanal.cz.cc/gate[REMOVED]
[http://]milion8dreams.ru/clou[REMOVED]
[http://]mjorart.com/jTc[REMOVED]
[http://]powergames.com.pt/KVG[REMOVED]
[http://]quranaqiq.com/1kH[REMOVED]
[http://]rdquark.com/cAB[REMOVED]
[http://]reymontstore.com/jJW5[REMOVED]
[http://]staugustineblues.com/n8cZZ[REMOVED]
[http://]www.rcrender.com/47NK[REMOVED]
[http://]www.westquimica.com/AuNP[REMOVED]
onylkp.in
weboffice.dyndns-office.com
willowcreekcompany.mobi
The Trojan may then perform the following actions:
Download additional malware
Steal passwords
Affected
Windows
|
WebAttackMaliciousWebsiteActivity_83
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Backdoor Trojan activity on the compromised computer.
Additional Information
Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various Windows platforms
|
WebAttackMaliciousWebsiteActivity_85
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Additional Information
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Affected
Windows OS
Response
|
WebAttackMaliciousWebsiteActivity_86
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Backdoor Trojan activity on the compromised computer.
Additional Information
Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various Windows platforms
|
WebAttackMaliciousWebsiteActivity_87
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_88
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_89
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_90
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Coinminer activity on the infected machine.
Additional Information
Coinminer is a detection for a file based cryptocurrency miner that runs on your system.
These miners consume enormous CPU resources, making computer use sluggish. If you have not installed the program, it might be installed through various malicious sources like bundled in PUA, exploitation, malware, etc.
If you receive this signature's alert, it indicates your machine is hosted with Coinminer.
Affected
Various Operating System platforms
|
WebAttackMaliciousWebsiteActivity_91
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousWebsiteActivity_92
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan.Revetrat activity on the compromised computer.
Additional Information
Trojan.Revetrat is a remote access Trojan that opens a back door on the compromised computer and may download potentially malicious files.
Affected
Various Windows platforms
Response
|
WebAttackMaliciousWebsiteActivity_93
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan.Revetrat activity on the compromised computer.
Additional Information
Trojan.Revetrat is a remote access Trojan that opens a back door on the compromised computer and may download potentially malicious files.
Affected
Various Windows platforms
Response
|
WebAttackMaliciousWebsiteActivity_94
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_95
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit various vulnerabilities in the machine.
Additional Information
Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system.
Affected
Various platforms, devices.
Response
|
WebAttackMaliciousWebsiteActivity_96
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Ransomware network encryption activity.
Additional Information
Ransomware encrypts targeted files stored on local and mounted network drives of the compromised machine. Encrypted files are usually appended with suspicious extension such as .locked, .encrypted, .RYK, etc.
Once it completes the encryption activity, it then issues a ransom demand in order to restore the encrypted files.
Affected
Various platforms
|
WebAttackMaliciousWebsiteActivity_97
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackMaliciousWebsiteActivity_98
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousWebsiteActivity_99
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks.
Additional Information
JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks.
Affected
Various Windows platforms.
Response
|
WebAttackMaliciousWebsiteRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect malicious web pages using manual sharing as spreading vector.
Additional Information
Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it.
Affected
Various browsers.
|
Web Attack: Malicious Website Redirect 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect malicious web pages using manual sharing as spreading vector.
Additional Information
Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it.
Affected
Various browsers.
|
WebAttackMaliciousWebsiteRedirect3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect malicious web pages using manual sharing as spreading vector.
Additional Information
Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it.
Affected
Various browsers.
|
WebAttackMaliciousWebsiteRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature prevents access to a host with sufficiently bad reputation as to be auto-blocked.
Additional Information
This signature prevents access to a host with sufficiently bad reputation as to be auto-blocked.
Affected
Any software making connections to hosts with poor reputation.
Response
The request to the server has been blocked; there is no further action required.
|
Web Attack: Malicious Website Request 10
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 11
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 12
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteRequest13
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteRequest14
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 15
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousWebsiteRequest3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousWebsiteRequest4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious activities associated with WP-VCD infection.
Additional Information
WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search
engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site.
Affected
WordPress websites
|
WebAttackMaliciousWebsiteRequest5
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteRequest6
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 7
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 8
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious Website Request 9
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects connections to malicious websites associated with malicious browser extension download or activity.
Additional Information
Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension.
Affected
Various platforms.
Response
No additional response is required.
If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806
If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousWebsiteScriptRedirect16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousWebsiteScriptRedirect17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousWebsiteScriptRedirect18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMaliciousZIPfiledownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects downloading of malicious exploit files contained inside a ZIP file.
Additional Information
Malicious attackers hide their exploits under legitimate ZIP files and send it to innocent users making them to fall for the exploit. When the file inside the archive is opened the user's machine gets exploited.
Affected
NA
Response
NA
|
WebAttackMaliciousZipFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a fake antivirus scan page that displays false virus scan results.
Additional Information
This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software.
The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download.
Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats.
Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software.
Affected
Various operating systems
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
|
Web Attack: Malicious ZIP File Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious ZIP file uploaded to an application server.
Additional Information
Attackers can upload malicious ZIP files that when processed by a vulnerable application can lead to remote code execution.
Affected
Various applications.
Response
|
Web Attack : Malvertisement Website Redirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect18_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 26
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect30
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack : Malvertisement Website Redirect 36
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMalvertisementWebsiteRedirect7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebAttackMalvertisementWebsiteRedirect8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
Web Attack: Malvertisement Website Redirect 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious advertisements leading to malware or exploit.
Additional Information
Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine.
Affected
Various Web Browsers
|
WebattackMan2web
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
man2web is a Web based application that converts man pages to HTML. It is implemented in CGI.
Additional Information
man2web is a Web based application that converts man pages to HTML. It is implemented in CGI.
man2web is affected by a command execution vulnerability affecting multiple scripts. This issue arises due to insufficient sanitization of user-supplied data.
The vulnerability affects the 'man-cgi', 'man2web', and 'man2html' scripts. A remote attacker can supply arbitrary commands to the application through HTTP GET requests that may be executed with the privileges of an affected Web server.
This can facilitate a remote compromise.
Affected
man2web man2web 0.87, 0.88
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
|
WebAttackManageEngineMetadataServletCVE-2014-3996
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging a SQL injection vulnerability in ManageEngine multiple products which could lead to system compromise.
Additional Information
ManageEngine multiple products are prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input submitted to the 'sv' parameter of the 'LinkViewFetchServlet.dat' file.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Affected
The following products are affected:
ManageEngine Desktop Central 4 through 9 build 90033
ManageEngine Password Manager Pro 5 through 7 build 7002
ManageEngine IT360 8 through 10.1.1 build 10110
|
Web Attack: ManageEngine OpManager Path Traversal CVE-2023-47211
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit directory traversal vulnerability on the ManageEngine OpManager.
Additional Information
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
Affected
ManageEngine OpManager 12.7.258.
Response
|
WebAttackMantisbtImportxmlCVE-2014-7146
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging a vulnerability in XmlImportExport plugin for MantisBT which could lead to execute arbitrary PHP code.
Additional Information
MantisBT is a web-based bug management application implemented in PHP.
XmlImportExport plugin for MantisBT is prone to an arbitrary PHP code-execution vulnerability because it fails to properly validate user-supplied input submitted to the 'description' field of the 'ImportXml.php' script. Specifically, this issue affects the 'preg_replace()' function.
An attacker can exploit this issue to execute arbitrary PHP code within the context of the web server.
Affected
MantisBT
|
Web Attack: Masscan Scanner Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Masscan scans on the machine.
Additional Information
Masscan is a scanning tool that scans and alerts on vulnerabilities found on remote machines.
Affected
Various Platforms.
Response
|
Web Attack: Mass Iframe Injection Attack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMassIframeInjectionAttack2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.