Keyword: irc generic
30596 Total Search   |   Showing Results : 261 - 280
This is the Trend Micro generic detection for URLs related to fraudulent activities. Fraud-related activities aim to get money from intended victims. Cybercriminals set up fraudulent or fake websites
Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
\ Windows\CurrentVersion\MCD SwapSync = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Palettized Formats = 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\CurrentVersion\MCD Use Generic
TrojanDownloader:Win32/Tonick.gen (Microsoft); Generic BackDoor.f (McAfee); Backdoor.IRC.Bot (Symantec); Trojan-Downloader.Win32.VB.dck, Trojan-Downloader.Win32.VB.dck (Kaspersky); Trojan.Win32.Generic!BT (Sunbelt);
This is a Trend Micro generic detection for email with suspicious contents likely to be a Business Email Compromise (BEC) attack. BEC is a sophisticated scam carried out by social engineering to make
possibly malicious files create scheduled tasks get system information get IP address uninstall itself create/terminate processes collect internet certificates perform FTP and IRC commands It terminates
servers: {BLOCKED}ate.com It joins any of the following IRC channel(s): #1 It opens a random port to allow a remote user to connect to the affected system. Once a successful connection is established, the
\Run J_Y = "%Windows%\J_Y.exe" Other System Modifications This worm adds the following registry keys: HKEY_CLASSES_ROOT\.cha HKEY_CLASSES_ROOT\ChatFile HKEY_CLASSES_ROOT\irc\Shell\ open\ddeexec
Vista/Win7 only) Backdoor Routine This backdoor connects to any of the following IRC server(s): {BLOCKED}etexplorers.org It accesses a remote Internet Relay Chat (IRC) server where it receives the following
This is Trend Micro's generic detection for malwares that are capable of propagating copies of itself via any of the following mediums: Removable Drives Network Shares Mass-mail IM Messengers
confidentiality and integrity via unknown vectors. oracle database_server 11.1.0.7,oracle enterprise_manager 10.2.0.4 Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
integrity via unknown vectors. oracle database_server 11.1.0.7,oracle enterprise_manager 10.2.0.4 Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL Injection Prevention
AMTVersion parameter to remote/serverlist_grouptree.aspx. Landesk Management Suite Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
via unspecified vectors. ibm tivoli_endpoint_manager 9.1.1117 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
time and description parameters. Apache Tomcat 4.1.31 Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Application Common 1000608* - Generic SQL Injection Prevention Integrity Monitoring Rules: There are no new or updated
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Application Common 1000608* - Generic SQL Injection Prevention Integrity Monitoring Rules: There are no new or updated
"blind SQL injection" issue. symantec web_gateway 5.0,symantec web_gateway 5.0.1,symantec web_gateway 5.0.2,symantec web_gateway 5.0.3 Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL
"blind SQL injection" issue. symantec web_gateway 5.0,symantec web_gateway 5.0.1,symantec web_gateway 5.0.2,symantec web_gateway 5.0.3 Apply associated Trend Micro DPI Rules. 1000608| 1000608 - Generic SQL
scripting (XSS) attacks using UTF-7 encoding. apache http_server 1.3,apache http_server 2. Apply associated Trend Micro DPI Rules. 1000552| 1000552 - Generic Cross Site Scripting(XSS) Prevention