#alert http $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET DELETED MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET "; nocase; depth:4; uricontent:".php?&&reader_version="; nocase; reference:url,doc.emergingthreats.net/2011715; classtype:trojan-activity; sid:2011715; rev:3; metadata:created_at 2010_07_30, updated_at 2010_07_30;)

Added 2017-08-07 21:04:46 UTC


#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET DELETED MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET"; nocase; http_method; content:".php?&&reader_version="; nocase; http_uri; reference:url,doc.emergingthreats.net/2011715; classtype:trojan-activity; sid:2011715; rev:3;)

Added 2012-03-13 14:42:38 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET"; nocase; http_method; content:".php?&&reader_version="; nocase; http_uri; reference:url,doc.emergingthreats.net/2011715; classtype:trojan-activity; sid:2011715; rev:3;)

Added 2011-10-12 19:32:27 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET"; nocase; http_method; content:".php?&&reader_version="; nocase; http_uri; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2011715; sid:2011715; rev:3;)

Added 2011-09-14 22:45:16 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET"; nocase; http_method; content:".php?&&reader_version="; nocase; http_uri; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2011715; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Malvertising; sid:2011715; rev:3;)

Added 2011-02-04 17:31:29 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET CURRENT_EVENTS MALVERTISING Adobe Exploited Check-In"; flow:established,to_server; content:"GET "; nocase; depth:4; uricontent:".php?&&reader_version="; nocase; classtype:trojan-activity; reference:url,doc.emergingthreats.net/2011715; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_Malvertising; sid:2011715; rev:2;)

Added 2010-06-28 23:46:16 UTC


Topic revision: r1 - 2017-08-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats