alert dns $HOME_NET any -> any any (msg:"ET CURRENT_EVENTS Possible Protonmail Phishing Domain in DNS Query"; dns_query; content:"prtn.xyz"; nocase; isdataat:!1,relative; metadata: former_category TROJAN; reference:url,threatconnect.com/blog/building-out-protonmail-spoofed-infrastructure/; classtype:bad-unknown; sid:2027783; rev:2; metadata:affected_product Web_Browsers, attack_target Client_Endpoint, deployment Perimeter, signature_severity Minor, created_at 2019_08_01, updated_at 2019_08_01;)

Added 2019-08-01 19:07:43 UTC


Topic revision: r1 - 2019-08-01 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats