alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_CLIENT Possible Phishing Redirect Feb 09 2016"; flow:to_client,established; content:"302"; http_stat_code; content:"Content-Type|3a 20|text/html"; http_header; content:"|0d 0a|location|3a 20|"; fast_pattern; http_header; pcre:"/^[a-f0-9]{32}\??\x0d\x0a/RHi"; classtype:trojan-activity; sid:2025006; rev:5; metadata:attack_target Client_Endpoint, created_at 2016_02_10, deployment Perimeter, former_category PHISHING, signature_severity Critical, tag Phishing, updated_at 2020_08_13, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1566, mitre_technique_name Phishing;)

Added 2021-07-06 18:45:53 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_CLIENT Possible Phishing Redirect Feb 09 2016"; flow:to_client,established; content:"302"; http_stat_code; content:"Content-Type|3a 20|text/html"; http_header; content:"|0d 0a|location|3a 20|"; fast_pattern; http_header; pcre:"/^[a-f0-9]{32}\??\x0d\x0a/RHi"; classtype:trojan-activity; sid:2025006; rev:5; metadata:attack_target Client_Endpoint, created_at 2016_02_10, deployment Perimeter, former_category PHISHING, signature_severity Major, tag Phishing, updated_at 2020_08_13;)

Added 2020-08-17 18:50:52 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_CLIENT Possible Phishing Redirect Feb 09 2016"; flow:to_client,established; content:"302"; http_stat_code; content:"Content-Type|3a 20|text/html"; http_header; content:"|0d 0a|location|3a 20|"; fast_pattern; http_header; pcre:"/^[a-f0-9]{32}\??\x0d\x0a/RHi"; classtype:trojan-activity; sid:2025006; rev:5; metadata:attack_target Client_Endpoint, created_at 2016_02_10, deployment Perimeter, former_category PHISHING, signature_severity Major, tag Phishing, updated_at 2017_11_16;)

Added 2020-08-05 19:14:10 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET WEB_CLIENT Possible Phishing Redirect Feb 09 2016"; flow:to_client,established; content:"302"; http_stat_code; content:"Content-Type|3a 20|text/html"; http_header; content:"|0d 0a|location|3a 20|"; fast_pattern; http_header; pcre:"/^[a-f0-9]{32}\??\x0d\x0a/RHi"; metadata: former_category PHISHING; classtype:trojan-activity; sid:2025006; rev:5; metadata:attack_target Client_Endpoint, deployment Perimeter, tag Phishing, signature_severity Major, created_at 2016_02_10, updated_at 2017_11_16;)

Added 2019-09-10 20:12:57 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET CURRENT_EVENTS Possible Phishing Redirect Feb 09 2016"; flow:to_client,established; content:"302"; http_stat_code; content:"Content-Type|3a 20|text/html"; http_header; content:"|0d 0a|location|3a 20|"; fast_pattern; http_header; pcre:"/^[a-f0-9]{32}\??\x0d\x0a/RHi"; metadata: former_category CURRENT_EVENTS; classtype:trojan-activity; sid:2025006; rev:5; metadata:attack_target Client_Endpoint, deployment Perimeter, tag Phishing, signature_severity Major, created_at 2016_02_10, updated_at 2017_11_16;)

Added 2017-11-16 16:21:55 UTC


Topic revision: r1 - 2021-07-06 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats