[***] Summary: [***] 7 new Open Signatures, 12 new Pro. W32/SpyClicker, Spy.Bancos, Abuse.ch SSL blacklist. Thanks: Kevin Ross, James Lay and @abuse_ch. [+++] Added rules: [+++] Open: 2019354 - ET TROJAN Reply Sinkhole - irc-sinkhole.cert.pl (trojan.rules)
2019355 - ET TROJAN W32/SpyClicker.ClickFraud CnC Beacon (trojan.rules)
2019356 - ET TROJAN W32/SpyClicker.ClickFraud Click CnC Beacon (trojan.rules)
2019357 - ET TROJAN SpyClicker.ClickFraud Query Instructions CnC Response (trojan.rules)
2019360 - ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC) (trojan.rules)
2019361 - ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (KINS CnC) (trojan.rules)
2019362 - ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 42 (trojan.rules) Pro: 2808941 - ETPRO TROJAN Win32/Spy.Bancos.ACW Checkin (trojan.rules)
2808942 - ETPRO TROJAN Win32/Clisbot.A Checkin (trojan.rules)
2808943 - ETPRO TROJAN Win32.Juched Checkin (trojan.rules)
2808944 - ETPRO TROJAN Win32/Comame Checkin (trojan.rules)
2808945 - ETPRO MALWARE Win32/AdWare.ICLoader Variant Checkin (malware.rules)
[///] Modified active rules: [///] 2011124 - ET MALWARE Suspicious FTP 220 Banner on Local Port (spaced) (malware.rules)
2013535 - ET INFO HTTP Request to a *.tc domain (info.rules) [---] Disabled and modified rules: [---] 2800446 - ETPRO SQL Application Server 10g OPMN Service Format String Vulnerability (sql.rules)
2807810 - ETPRO WEB_CLIENT CSelectTracker type confusion CVE-2014-0314 (web_client.rules)
[---] Removed rules: [---] 2008682 - ET TROJAN Trojan.Zonebac.D (trojan.rules)
Date: 
Sunday, October 5, 2014 - 22:00