Daily Ruleset Update Summary 2014/04/15

[***] Summary: [***] 2 new Open signatures, 4 new Pro (2/2). Zegost, ProRat. [+++] Added rules: [+++] 2018390 - ET TROJAN Backdoor Win32/Zegost.Q CnC traffic (OUTBOUND) (trojan.rules)
2018392 - ET ATTACK_RESPONSE Possible MS CMD Shell opened on local system 2 (attack_response.rules)
2807950 - ETPRO TROJAN Backdoor.Win32.ProRat Checkin (trojan.rules)
2807951 - ETPRO TROJAN Win32.Wapomi.AA CnC (OUTBOUND) (trojan.rules)
[///] Modified active rules: [///] 2011582 - ET POLICY Vulnerable Java Version 1.6.x Detected (policy.rules)
2014297 - ET POLICY Vulnerable Java Version 1.7.x Detected (policy.rules)
2017412 - ET TROJAN Gh0st_Apple Checkin (trojan.rules)
2805345 - ETPRO TROJAN Troj/Mdrop-DXT checkin 1 (trojan.rules)
2805970 - ETPRO TROJAN Backdoor.Win32.MoSucker.23 reporting via ICQ WWW script (trojan.rules)
[---] Removed rules: [---] 2014629 - ET CURRENT_EVENTS Possible Blackhole Landing to 8 chr folder plus js.js (current_events.rules)
2015709 - ET CURRENT_EVENTS Possible Blackhole Landing to 7-8 chr folder plus index.htm or index.html (current_events.rules)
2804470 - ETPRO TROJAN PWS-Spyeye.eo Checkin (trojan.rules)

 

Date: 
Tuesday, April 15, 2014 - 00:00