Signature Update #2547

Signature Update #2547 129 new signatures:HIGHHTTP: Blackhole Exploit Kit Landing Page RequestedHIGHHTTP: Bleeding Life Exploit Kit Module Call 11HIGHHTTP: Bleeding Life Exploit Kit Module Call 10HIGHHTTP: Bleeding Life Exploit Kit Module Call 9HIGHHTTP: Bleeding Life Exploit Kit Module Call 8HIGHHTTP: Bleeding Life Exploit Kit Module Call 12HIGHHTTP: Bleeding Life Exploit Kit Module Call 7HIGHHTTP: Bleeding Life Exploit Kit Module Call 6HIGHHTTP: Bleeding Life Exploit Kit Module Call 5HIGHHTTP: Bleeding Life Exploit Kit Module Call 2HIGHHTTP: Phoenix Exploit Kit Post Compromise BehaviorHIGHHTTP: Possible Exploit Kit Post Compromise StrReverse ActivityHIGHHTTP: Possible Exploit Kit Post Compromise Taskkill ActivityHIGHHTTP: SET Java Applet Load AttemptHIGHHTTP: Fake Transaction Redirect Rage To Exploit KitHIGHHTTP: Suspicious Taskkill Script StrReverseHIGHHTTP: Suspicious StrReverse ShellHIGHHTTP: Suspicious StrReverse Scripting FileSystemObjectHIGHHTTP: Multiple Exploit Kit Info.exe PayloadHIGHHTTP: Multiple Exploit Kit calc.exe Payload DetectionHIGHHTTP: Multiple Exploit Kit about.exe Payload DetectionHIGHHTTP: Multiple Exploit Kit Readme.exe PayloadHIGHHTTP: Sweet Orange Exploit Kit Landing Page 3HIGHHTTP: Sweet Orange Exploit Kit Landing Page 2HIGHHTTP: Red Dot Landing Page 1HIGHHTTP: Red Dot Executable Retrieval AttemptHIGHHTTP: Embedded Iframe RedirectionHIGHHTTP: JDB Exploit Kit Landing Page 1HIGHHTTP: JDB Exploit Kit Landing PageHIGHHTTP: Zuponcic Exploit Kit Oracle Java File DownloadHIGHHTTP: Multiple Exploit Kit Jar File DroppedHIGHHTTP: Whitehole Exploit Kit Landing PageHIGHHTTP: Styx Exploit Kit Landing Page 1HIGHHTTP: Sweet Orange Exploit Kit Landing Page2HIGHHTTP: Sweet Orange Exploit Kit Landing Page1HIGHHTTP: Sweet-Orange Exploit Kit Landing PageHIGHHTTP: Styx Exploit Kit Landing PageHIGHHTTP: Styx Exploit Kit Redirection PageHIGHHTTP: CritX Exploit Kit Redirection PageHIGHHTTP: IFRAMEr Injection DetectionHIGHHTTP: Nuclear Exploit Kit Landing Page 1HIGHHTTP: Private Exploit Kit Landing Page 4HIGHHTTP: Private Exploit Kit Landing Page 3HIGHHTTP: Private Exploit Kit Landing PageHIGHHTTP: Private Exploit Kit Outbound TrafficHIGHHTTP: Embedded Iframe Redirection Exploit Kit Indicator 2HIGHHTTP: IFramer Toolkit Injected Iframe Detected Specific StructureHIGHHTTP: Goon/Infinity Exploit Kit Iframe RedirectionHIGHHTTP: CritX Exploit Kit Java Exploit Request Structure 2HIGHHTTP: Kore Exploit Kit Landing Page 3HIGHHTTP: Kore Exploit Kit Landing PageHIGHHTTP: Kore Exploit Kit Successful Java ExploitHIGHHTTP: Gong Da Exploit Kit Landing Page 2HIGHHTTP: Gong Da Exploit Kit Java Exploit Requested 1HIGHHTTP: Gong Da Exploit Kit Java Exploit RequestedHIGHHTTP: IFRAMEr Tool Embedded Javascript Attack Method Specific StructureHIGHHTTP: Multiple Exploit Kit Landing PageHIGHHTTP: Multiple Exploit Kit Redirection PageHIGHHTTP: Neutrino Exploit Kit Plugin Detection PageHIGHHTTP: Blackholev2/Darkleech Exploit Kit Landing PageHIGHHTTP: Kore Exploit Kit Outbound Payload Download AttemptHIGHHTTP: Rmayana Exploit Kit Obfuscation TechniqueHIGHHTTP: Teletubbies Exploit Kit Payload Download 1HIGHHTTP: Teletubbies Exploit Kit Payload Download 9HIGHHTTP: Teletubbies Exploit Kit Payload Download 8HIGHHTTP: Teletubbies Exploit Kit Payload Download 7HIGHHTTP: Teletubbies Exploit Kit Payload Download 6HIGHHTTP: Teletubbies Exploit Kit Payload Download 5HIGHHTTP: Teletubbies Exploit Kit Payload Download 4HIGHHTTP: Teletubbies Exploit Kit Payload Download 3HIGHHTTP: Teletubbies Exploit Kit Payload DownloadHIGHHTTP: Teletubbies Exploit Kit Exploit 2HIGHHTTP: Teletubbies Exploit Kit Payload Download 2HIGHHTTP: Multiple Exploit Kit Payload about.dllHIGHHTTP: Multiple Exploit Kit Payload info.dllHIGHHTTP: Multiple Exploit Kit Payload contacts.dllHIGHHTTP: Multiple Exploit Kit Payload calc.dllHIGHHTTP: Multiple Exploit Kit Payload readme.dllHIGHHTTP: X2O Exploit Kit Landing Page 3HIGHHTTP: X2O Exploit Kit Landing PageHIGHHTTP: Embedded Iframe Redirection Exploit Kit Indicator 7HIGHHTTP: Embed

  • 8 years ago Posted in