Keyword: bec_suspicious.ers
2853 Total Search   |   Showing Results : 701 - 720
Apply associated Trend Micro DPI Rules. 1007969|
Description Name: Possible CVE-2016-6662 - MySQL Remote Code Execution Exploit - Variant 2 . This is Trend Micro detection for MYSQL network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host ex...
Description Name: COMMAND INJECTION IN URI - HTTP . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:Exces...
Description Name: AGENT - HTTP (Request) - Variant 20 . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behav...
Description Name: POWERSHELL Download - HTTP (Request) - Variant 2 .
Description Name: Meta tag redirecting to executable file - HTTP (Response) . This is Trend Micro detection for packets passing through HTTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicato...
Description Name: Powershell - SMB .
Description Name: ASP WebShell - HTTP (Request) .
Description Name: Host Discovery - UDP (Request) .
Description Name: S7 Enumerate Redpoint NSE Request CPU Function Read SZL - TCP (Request) .
Description Name: Possible Scan of Outstation - DNP3 (Response) Beta .
Description Name: Possible PDF in Chrome Information Disclosure - HTTP (Request) .
Description Name: DEMO RULE - ICMP (Request) . This is Trend Micro detection for packets passing through ICMP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspi...
Description Name: Unauthorized STARTDT IEC-104 Request .
Description Name: Non-IEC-104 Communication Request .
Description Name: POSGERAT Data Exfiltration - DNS (Response) . This is Trend Micro detection for packets passing through DNS network protocols that can be used as Data Exfiltration. This also indicates a malware infection. Below are some indicators ...
Description Name: Transmitted executable or script file - IRC (Request) . This is Trend Micro detection for packets passing through IRC network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of...
Description Name: GUMBLAR - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspici...
Description Name: CKNIFE - HTTP (Request) .
Description Name: PHP Webshell - HTTP (Request) - Variant 2 .