Business

search ✕
  • 솔루션
    • Platform
      • Trend One
        트렌드마이크로의 통합된 플랫폼

        위협 방지와 사이버 위험 관리를 연결하여 보안 성과를 강화하십시오

        자세히 알아보기
    • 과제별
      • 과제별
        • 과제별
          자세히 알아보기
      • 위험 이해, 우선순위 지정 및 위험 완화
        • 위험 이해, 우선순위 지정 및 위험 완화

          공격 표면 관리를 통한 위험 태세 개선

          자세히 알아보기
      • 클라우드 네이티브 앱 보호
        • 클라우드 네이티브 앱 보호

          비즈니스 성과를 실현해 주는 보안

          자세히 알아보기
      • 하이브리드 환경 보호
        • 하이브리드 및 멀티 클라우드 보호

          보안을 통해 가시성 확보 및 비즈니스 요구사항 충족

          자세히 알아보기
      • 전 세계 직원 보호
        • 전 세계 직원 보호

          어디서나 어떤 장치에서나 자신 있게 연결

          자세히 알아보기
      • 네트워크 사각지대 제거
        • 네트워크 사각지대 제거

          전체 환경에서 사용자와 핵심 운영 활동을 보호

          자세히 알아보기
      • See More, Move Faster
        • 빠른 탐지와 정확한 대응.

          강력한 전용 XDR, 공격 표면 위험 관리 및 제로 트러스트 기능으로 공격자보다 더 빠르게 움직입니다.

          자세히 알아보기
      • Extend Your Team
        • 팀 역량 강화 위협에 민첩하게 대응

          선제적 위험 감소와 관리형 서비스로 효율성 극대화

          자세히 알아보기
    • 역할별
      • 역할별
        • 역할별
          자세히 알아보기
      • CISO
        • CISO

          측정 가능한 사이버 보안 성과로 비즈니스 가치 향상

          자세히 알아보기
      • SOC 관리자
        • SOC 관리자

          더 많은 위협에 빠르게 대응

          자세히 알아보기
      • 인프라 관리자
        • 인프라 관리자

          보안을 강화해 위협을 빠르고 효과적으로 완화

          자세히 알아보기
      • 클라우드 빌더 및 개발자
        • 클라우드 빌더 및 개발자

          코드가 의도대로 실행되는지 확인

          자세히 알아보기
      • 클라우드 보안 Ops
        • 클라우드 보안 Ops

          클라우드 환경용 보안으로 가시성과 제어력 확보

          자세히 알아보기
    • 산업별
      • 산업별
        • 산업별
          자세히 알아보기
      • Healthcare
        • 의료 서비스

          의료 서비스 규정을 준수하면서 환자 데이터, 장치 및 네트워크 보호

          자세히 알아보기
      • Manufacturing
        • 제조

          기존 장치에서 최첨단 인프라에 이르기까지 공장 환경 보호

          자세히 알아보기
      • 석유 및 가스
        • 석유 및 가스

          석유 및 가스 설비 산업을 위한 ICS/OT 보안

          자세히 알아보기
      • 전기 유틸리티
        • 전기 유틸리티

          전기 유틸리티를 위한 ICS/OT 보안

          자세히 알아보기
      • 자동차
        • 자동차
          자세히 알아보기
      • 5G 네트워크
        • 5G 네트워크
          자세히 알아보기
  • 제품
    • 클라우드 보안
      • 클라우드 보안
        • Trend Cloud One
          클라우드 보안 개요

          개발자, 보안 팀, 기업을 위한 가장 신뢰할 수 있는 클라우드 보안 플랫폼

          자세히 알아보기
      • Workload Security
        • 워크로드 보안

          CNAPP 기능을 지원하는 클라우드 보안 플랫폼을 활용하여 성능 손상 없이 데이터 센터, 클라우드 및 컨테이너를 보호합니다.

          자세히 알아보기
      • Cloud Security Posture Management
        • CSPM

          완전한 가시성과 신속한 문제 해결 활용

          자세히 알아보기
      • Container Security
        • Container Security

          고급 컨테이너 이미지 스캔, 정책 기반 승인 제어, 컨테이너 런타임 보호를 통해 클라우드 네이티브 애플리케이션의 보안을 단순화합니다.

          자세히 알아보기
      • File Storage Security
        • File Storage Security

          클라우드 네이티브 애플리케이션 아키텍처를 활용하는 클라우드 파일/개체 스토리지 서비스를 위한 보안

          자세히 알아보기
      • 엔드포인트 보안
        • 엔드포인트 보안

          모든 단계에서 엔드포인트 보호

          자세히 알아보기
      • 네트워크 보안
        • 네트워크 보안

          단일 및 다중 클라우드 환경을 위한 고급 클라우드 기반 네트워크 보안 탐지, 보호 및 사이버 위협 중단.

          자세히 알아보기
      • 오픈소스 보안
        • 오픈소스 보안

          SecOps의 오픈소스 취약점에 대한 가시성 및 모니터링

          자세히 알아보기
      • 클라우드 가시성
        • 클라우드 가시성

          조직이 계속해서 데이터와 앱을 클라우드로 마이그레이션하고 IT 인프라를 혁신하면서 비즈니스 속도 저하 없이 위험을 완화하는 것은 매우 중요합니다.

          자세히 알아보기
    • 네트워크 보안
      • 네트워크 보안
        • 네트워크 보안 개요

          네트워크 탐지 및 대응으로 XDR 성능 확장

          자세히 알아보기
      • 네트워크 침입 방지(IPS)
        • 네트워크 침입 방지(IPS)

          알려지거나 알려지지 않거나, 또는 공개되지 않은 취약점으로부터 네트워크를 보호합니다

          자세히 알아보기
      • Breach Detection System(BDS)
        • Breach Detection System(BDS)

          인바운드, 아웃바운드 및 측면으로 이동하는 표적 공격을 탐지하고 이에 대응합니다.

          자세히 알아보기
      • 시큐어 서비스 엣지(SSE)
        • 시큐어 서비스 엣지(SSE)

          지속적인 위험 평가를 통해 신뢰할 수 있고 안전한 디지털 혁신을 새롭게 재정립

          자세히 알아보기
      • OT 및 ICS 보안
        • OT 및 ICS 보안
          자세히 알아보기
    • 엔드포인트 및 이메일 보안
      • 엔드포인트 및 이메일 보안
        • 엔드포인트 및 이메일 보안 개요

          Trend Micro Workforce One으로 모든 디바이스, 애플리케이션, 장소에 관계없이 사용자를 보호합니다.

          자세히 알아보기
      • 엔드포인트 보호
        • 엔드포인트 보호
          자세히 알아보기
      • 이메일 보안
        • 이메일 보안

          피싱, 멀웨어, 랜섬웨어, 사기 및 표적형 공격이 기업에 침투하는 것을 방지합니다.

          자세히 알아보기
      • 모바일 보안
        • 모바일 보안

          멀웨어, 악성 애플리케이션 및 기타 모바일 위협에 대한 온프레미스 및 클라우드 보호

          자세히 알아보기
    • 보안 운영
      • 보안 운영
        • 보안 운영 개요

          오늘날 기업에 대한 완전한 중앙 집중식 가시성 지원

          자세히 알아보기
      • 공격 표면 관리
        • 공격 표면 관리

          제로 트러스트 전략 운영

          자세히 알아보기
      • XDR(확장된 탐지 및 대응)
        • XDR(확장된 탐지 및 대응)

          위협을 더 빠르게 추적하고, 탐지하고, 조사 및 대응하기 위해 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하십시오.

          자세히 알아보기
      • 위협 인텔리전스
        • 위협 인텔리전스

          지속적인 위협 예방 및 분석을 통한 데이터 보호

          자세히 알아보기
    • 중소기업 보안
      • 중소기업 보안

        종합적인 보호 기능으로 위협 차단

        자세히 알아보기
    • All Products, Services and Trials
      • 제품, 서비스 및 평가판
        자세히 알아보기
  • 리서치
    • 리서치
      • 리서치
        • 리서치
          자세히 알아보기
      • 트렌드마이크로 리서치 소개
        • 트렌드마이크로 리서치 소개
          자세히 알아보기
      • 리서치, 뉴스 및 전망
        • 리서치, 뉴스 및 전망
          자세히 알아보기
      • 리서치 결과 및 분석 보고서
        • 리서치 결과 및 분석 보고서
          자세히 알아보기
      • 블로그
        • 블로그
          자세히 알아보기
      • 보안 뉴스
        • 보안 뉴스
          자세히 알아보기
      • 제로 데이 이니셔티브(ZDI)
        • 제로 데이 이니셔티브(ZDI)
          자세히 알아보기
  • 서비스
    • 트렌드마이크로 서비스
      • 트렌드마이크로 서비스
        • 트렌드마이크로 서비스
          자세히 알아보기
      • 서비스 패키지
        • 서비스 패키지

          연중무휴 관리형 탐지 및 대응, 지원을 통해 보안 팀의 역량을 강화하십시오

          자세히 알아보기
      • Managed XDR
        • Managed XDR

          이메일, 엔드포인트, 서버, 클라우드 워크로드 및 네트워크를 위한 전문 관리형 탐지 및 대응(MDR)으로 팀을 확장합니다.

          자세히 알아보기
      • 지원 서비스
        • 지원 서비스
          자세히 알아보기
  • 파트너
    • 채널 파트너
      • 채널 파트너
        • 채널 파트너 개요

          업계 최고의 완벽한 다계층 보안을 통해 비즈니스를 성장시키고 고객을 보호하십시오

          자세히 알아보기
      • Managed Service Provider
        • 관리 서비스 공급자(MSP)

          클라우드 보안 글로벌 마켓을 리드하는 트렌드마이크로 Deep Security

          자세히 알아보기
      • Cloud Service Provider
        • 클라우드 서비스 공급자(CSP)

          사용하는 플랫폼에 관계없이 클라우드 서비스 오퍼링에 시장을 선도하는 보안을 추가하십시오.

          자세히 알아보기
      • 전문가 서비스
        • 전문가 서비스

          업계 최고의 보안 파트너를 통한 매출 증대

          자세히 알아보기
      • 리셀러
        • 리셀러

          가능성 알아보기

          자세히 알아보기
      • 마켓플레이스
        • 마켓플레이스
          자세히 알아보기
      • 시스템 통합 벤더
        • 시스템 통합업체
          자세히 알아보기
    • 제휴 파트너
      • 제휴 파트너
        • 제휴 개요

          트렌드마이크로는 성과와 가치를 높이기 위해 최선의 노력을 다하고 있습니다.

          자세히 알아보기
      • 기술 제휴 파트너
        • 기술 제휴 파트너
          자세히 알아보기
      • 트렌드마이크로의 전략적 제휴 파트너
        • 트렌드마이크로의 전략적 제휴 파트너
          자세히 알아보기
    • 파트너 도구
      • 파트너 도구
        • 파트너 도구
          자세히 알아보기
      • 파트너 로그인
        • 파트너 로그인
          로그인
      • 교육 및 인증
        • 교육 및 인증
          자세히 알아보기
      • 파트너 성공
        • 파트너 성공
          자세히 알아보기
      • 유통 업체
        • 유통 업체
          자세히 알아보기
      • 파트너 찾기
        • 파트너 찾기
          자세히 알아보기
  • 회사 소개
    • 트렌드마이크로를 선택해야 하는 이유
      • 트렌드마이크로를 선택해야 하는 이유
        • 트렌드마이크로를 선택해야 하는 이유
          자세히 알아보기
      • 트렌드마이크로의 차별점
        • 트렌드마이크로의 차별점
          자세히 알아보기
      • 고객 성공 사례
        • 고객 성공 사례
          자세히 알아보기
      • 수상 경력
        • 수상 경력
          자세히 알아보기
      • 전략적 제휴
        • 전략적 제휴
          자세히 알아보기
    • 회사
      • 회사
        • 회사
          자세히 알아보기
      • Trust Center
        • Trust Center
          자세히 알아보기
      • 역사
        • 역사
          자세히 알아보기
      • 다양성, 형평성 및 포용성
        • 다양성, 형평성 및 포용성
          자세히 알아보기
      • 기업의 사회적 책임
        • 기업의 사회적 책임
          자세히 알아보기
      • 리더십
        • 리더십
          자세히 알아보기
      • 보안 전문가
        • 보안 전문가
          자세히 알아보기
      • 인터넷 안전과 사이버 보안 교육
        • 인터넷 안전과 사이버 보안 교육
          자세히 알아보기
      • 법률
        • 법률
          자세히 알아보기
    • 리소스
      • 리소스
        • 리소스
          자세히 알아보기
      • 뉴스룸
        • 뉴스룸
          자세히 알아보기
      • 이벤트
        • 이벤트
          자세히 알아보기
      • 투자자
        • 투자자
          자세히 알아보기
      • 커리어
        • 인재 채용
          자세히 알아보기
      • 웨비나
        • 웨비나
          자세히 알아보기
      • 새로운 Knowledge Hub
        • 웨비나
          자세히 알아보기
  • 무료 평가판
  • 문의
가정용 제품을 찾으십니까?
사이버 공격을 받고 있습니까?
0
지원
  • 지원 포털
  • 기술 지원
  • 바이러스 및 위협 도움말
  • 갱신 및 등록
  • 교육 및 인증
  • 지원 연락처
  • 지원 파트너 찾기
리소스
  • 사이버 위험 지수/평가
  • CISO 리소스 센터
  • DevOps 리소스 센터
  • 정의
  • 위협 백과사전
  • 클라우드 상태 평가
  • 사이버 보험
  • 용어집
  • 웨비나
로그인
  • 지원
  • 파트너 포털
  • Cloud One
  • 제품 활성화 및 관리
  • 추천 계열사
➔
search
✕
  • Threat Encyclopedia
  • Network Content Inspection Rules

Network Content Inspection Rules

    Confidence Level:  
    Low
    Medium
    High
    Default Rule:  
    Rule IDRule DescriptionConfidence LevelDDI Default RuleNetwork Content Inspection Pattern Release Date
    DDI RULE 4818 CVE-2022-36804 - Atlassian Bitbucket Command Injection Exploit - HTTP(REQUEST) High
    2023/03/15DDI RULE 4818/vinfo/kr/threat-encyclopedia/network/ddi-rule-4818
    DDI RULE 4532 CVE-2021-26855 - Exchange Server Side Request Forgery Exploit - HTTP (REQUEST) - Variant 2 High
    2023/03/14DDI RULE 4532/vinfo/kr/threat-encyclopedia/network/ddi-rule-4532
    DDI RULE 4817 WINEXE DETECTED - SMB2(REQUEST) High
    2023/03/13DDI RULE 4817/vinfo/kr/threat-encyclopedia/network/ddi-rule-4817
    DDI RULE 4816 WINEXE DETECTED - SMB(REQUEST) High
    2023/03/09DDI RULE 4816/vinfo/kr/threat-encyclopedia/network/ddi-rule-4816
    DDI RULE 4815 CVE-2022-41082 - MS EXCHANGE POWERSHELL RCE EXPLOIT - HTTP(REQUEST) High
    2023/03/07DDI RULE 4815/vinfo/kr/threat-encyclopedia/network/ddi-rule-4815
    DDI RULE 4812 CVE-2022-1040 - SOPHOS FIREWALL USER PORTAL AND WEBADMIN REMOTE CODE EXECUTION - HTTP(EXPLOIT) High
    2023/02/16DDI RULE 4812/vinfo/kr/threat-encyclopedia/network/ddi-rule-4812
    DDI RULE 4811 CVE-2021-21974 - VMWARE OPENSLP RCE EXPLOIT - TCP(REQUEST) High
    2023/02/14DDI RULE 4811/vinfo/kr/threat-encyclopedia/network/ddi-rule-4811
    DDI RULE 4808 CVE-2022-40624 - NETGATE RCE EXPLOIT - HTTP(REQUEST) High
    2023/02/09DDI RULE 4808/vinfo/kr/threat-encyclopedia/network/ddi-rule-4808
    DDI RULE 4806 CVE-2022-44877 - CENTOS WEB PANEL COMMAND INJECTION - HTTP(EXPLOIT) High
    2023/02/09DDI RULE 4806/vinfo/kr/threat-encyclopedia/network/ddi-rule-4806
    DDI RULE 4807 CVE-2022-47966 - ZOHO MANAGEENGINE RCE - HTTP(REQUEST) High
    2023/02/09DDI RULE 4807/vinfo/kr/threat-encyclopedia/network/ddi-rule-4807
    DDI RULE 4805 CVE-2022-21587 - ORACLE DESKTOP INTEGRATOR DIRECTORY TRAVERSAL EXPLOIT - HTTP(REQUEST) High
    2023/02/08DDI RULE 4805/vinfo/kr/threat-encyclopedia/network/ddi-rule-4805
    DDI RULE 4804 CVE-2022-4223 - PGADMIN RCE EXPLOIT - HTTP(REQUEST) High
    2023/02/06DDI RULE 4804/vinfo/kr/threat-encyclopedia/network/ddi-rule-4804
    DDI RULE 4803 MALLOX - HTTP(REQUEST) High
    2023/01/30DDI RULE 4803/vinfo/kr/threat-encyclopedia/network/ddi-rule-4803
    DDI RULE 4802 CHISEL TUNNELING - HTTP(RESPONSE) High
    2023/01/17DDI RULE 4802/vinfo/kr/threat-encyclopedia/network/ddi-rule-4802
    DDI RULE 4801 CVE-2022-29499 - MITEL MIVOICE RCE - HTTP(EXPLOIT) High
    2023/01/11DDI RULE 4801/vinfo/kr/threat-encyclopedia/network/ddi-rule-4801
    DDI RULE 4800 MIMIKATZ SHELL - HTTP(RESPONSE) High
    2022/12/14DDI RULE 4800/vinfo/kr/threat-encyclopedia/network/ddi-rule-4800
    DDI RULE 4799 MIMIKATZ SHELL - TCP High
    2022/12/14DDI RULE 4799/vinfo/kr/threat-encyclopedia/network/ddi-rule-4799
    DDI RULE 4792 CVE-2022-35951 - REDIS INTEGER OVERFLOW - TCP(REQUEST) High
    2022/12/07DDI RULE 4792/vinfo/kr/threat-encyclopedia/network/ddi-rule-4792
    DDI RULE 4798 CVE-2022-30216 - WINDOWS SERVER SERVICES TAMPERING EXPLOIT - SMB2(REQUEST) High
    2022/12/01DDI RULE 4798/vinfo/kr/threat-encyclopedia/network/ddi-rule-4798
    DDI RULE 4797 CVE-2022-34721 - Windows Internet Key Exchange - Buffer Overflow RCE ISKAMP EXPLOIT - UDP(REQUEST) High
    2022/11/28DDI RULE 4797/vinfo/kr/threat-encyclopedia/network/ddi-rule-4797
    DDI RULE 4796 MICROSOFT EXCHANGE POWERSHELL EXPLOIT - HTTP(REQUEST) High
    2022/11/28DDI RULE 4796/vinfo/kr/threat-encyclopedia/network/ddi-rule-4796
    DDI RULE 4786 CVE-2022-41040 - MS Exchange Server Side Request Forgery Exploit- HTTP(REQUEST) Medium
    2022/11/24DDI RULE 4786/vinfo/kr/threat-encyclopedia/network/ddi-rule-4786
    DDI RULE 4795 CVE-2022-38129 - KEYSIGHT SMS DIRECTORY TRAVERSAL - HTTP(REQUEST) High
    2022/11/16DDI RULE 4795/vinfo/kr/threat-encyclopedia/network/ddi-rule-4795
    DDI RULE 4793 CVE-2022-3602 - OPENSSL BUFFER OVERFLOW EXPLOIT - TCP(REQUEST) High
    2022/11/14DDI RULE 4793/vinfo/kr/threat-encyclopedia/network/ddi-rule-4793
    DDI RULE 4794 CVE-2022-3602 - OPENSSL BUFFER OVERFLOW EXPLOIT - TCP(RESPONSE) High
    2022/11/14DDI RULE 4794/vinfo/kr/threat-encyclopedia/network/ddi-rule-4794
    DDI RULE 4790 CVE-2022-40684 - FORTINET AUTHBYPASS EXPLOIT - HTTP(REQUEST) High
    2022/10/24DDI RULE 4790/vinfo/kr/threat-encyclopedia/network/ddi-rule-4790
    DDI RULE 4791 CVE-2022-40300 - ZOHO MANAGEENGINE SQL CODE INJECTION - HTTP(REQUEST) High
    2022/10/24DDI RULE 4791/vinfo/kr/threat-encyclopedia/network/ddi-rule-4791
    DDI RULE 4789 CVE-2022-3236 - SOPHOS FIREWALL RCE - HTTP(REQUEST) High
    2022/10/19DDI RULE 4789/vinfo/kr/threat-encyclopedia/network/ddi-rule-4789
    DDI RULE 4788 CVE-2022-26013 - DELTA ELECTRONICS DIAENERGIE RCE EXPLOIT - HTTP(REQUEST) High
    2022/10/17DDI RULE 4788/vinfo/kr/threat-encyclopedia/network/ddi-rule-4788
    DDI RULE 4787 RPC POSSIBLE DCSYNC - DCE (REQUEST) - Variant 2 Medium
    2022/10/11DDI RULE 4787/vinfo/kr/threat-encyclopedia/network/ddi-rule-4787
    DDI RULE 4785 CVE-2022-40144 - Trend Micro Apex One Login Authentication Bypass Exploit - HTTP(REQUEST) High
    2022/09/27DDI RULE 4785/vinfo/kr/threat-encyclopedia/network/ddi-rule-4785
    DDI RULE 4756 CVE-2022-22980 - SPRING DATA MONGODB REMOTE CODE EXECUTION - HTTP(REQUEST) High
    2022/09/15DDI RULE 4756/vinfo/kr/threat-encyclopedia/network/ddi-rule-4756
    DDI RULE 4764 CVE-2022-30525 - ZYXEL FIREWALL COMMAND INJECTION - HTTP(REQUEST) High
    2022/09/15DDI RULE 4764/vinfo/kr/threat-encyclopedia/network/ddi-rule-4764
    DDI RULE 4781 CVE-2022-2135 - Advantech iView SQL Injection Exploit - HTTP(REQUEST) High
    2022/09/14DDI RULE 4781/vinfo/kr/threat-encyclopedia/network/ddi-rule-4781
    DDI RULE 4688 COROXY - UDP(REQUEST) High
    2022/09/14DDI RULE 4688/vinfo/kr/threat-encyclopedia/network/ddi-rule-4688
    DDI RULE 4678 CVE-2022-22965 - SPRING RCE EXPLOIT - HTTP(REQUEST) High
    2022/09/14DDI RULE 4678/vinfo/kr/threat-encyclopedia/network/ddi-rule-4678
    DDI RULE 4779 CVE-2022-35405 - ZOHO MANAGE ENGINE RCE EXPLOIT - HTTP(REQUEST) High
    2022/09/13DDI RULE 4779/vinfo/kr/threat-encyclopedia/network/ddi-rule-4779
    DDI RULE 4780 CVE-2022-2135 - HIKVISION WEB SERVER RCE EXPLOIT - HTTP(REQUEST) Low
    2022/09/07DDI RULE 4780/vinfo/kr/threat-encyclopedia/network/ddi-rule-4780
    DDI RULE 1007 WMI Execute Method Request detected Low
    2022/09/06DDI RULE 1007/vinfo/kr/threat-encyclopedia/network/ddi-rule-1007
    DDI RULE 4777 ANYDESK - HTTPS(REQUEST) High
    2022/08/31DDI RULE 4777/vinfo/kr/threat-encyclopedia/network/ddi-rule-4777
    DDI RULE 4778 ATERA - HTTP(REQUEST) High
    2022/08/30DDI RULE 4778/vinfo/kr/threat-encyclopedia/network/ddi-rule-4778
    DDI RULE 4776 CVE-2022-31659 - VMWARE AUTHBYPASS EXPLOIT - HTTP(REQUEST) High
    2022/08/23DDI RULE 4776/vinfo/kr/threat-encyclopedia/network/ddi-rule-4776
    DDI RULE 4775 CVE-2022-31656 - VMWARE AUTHBYPASS EXPLOIT - HTTP(REQUEST) Medium
    2022/08/23DDI RULE 4775/vinfo/kr/threat-encyclopedia/network/ddi-rule-4775
    DDI RULE 4774 CVE-2022-27925 - ZIMBRA RCE EXPLOIT - HTTP(REQUEST) High
    2022/08/22DDI RULE 4774/vinfo/kr/threat-encyclopedia/network/ddi-rule-4774
    DDI RULE 4773 CVE-2022-21972 - PTPP REMOTE CODE EXECUTION - TCP(EXPLOIT) High
    2022/08/18DDI RULE 4773/vinfo/kr/threat-encyclopedia/network/ddi-rule-4773
    DDI RULE 4768 SUSPICIOUS WINREG - SMB2(REQUEST) High
    2022/08/16DDI RULE 4768/vinfo/kr/threat-encyclopedia/network/ddi-rule-4768
    DDI RULE 4772 WEBDAV DIRECTORY TRAVERSAL EXPLOIT - HTTP(RESPONSE) High
    2022/08/12DDI RULE 4772/vinfo/kr/threat-encyclopedia/network/ddi-rule-4772
    DDI RULE 4759 COMMAND INJECTION EXPLOIT SENSOR - HTTP (REQUEST) - Variant 2 Medium
    2022/08/11DDI RULE 4759/vinfo/kr/threat-encyclopedia/network/ddi-rule-4759
    DDI RULE 4771 WVKEYLOGGER - HTTP(REQUEST) High
    2022/08/02DDI RULE 4771/vinfo/kr/threat-encyclopedia/network/ddi-rule-4771
    DDI RULE 4770 CVE-2022-23277 - EXCHANGE RCE EXPLOIT - HTTP(REQUEST) High
    2022/07/27DDI RULE 4770/vinfo/kr/threat-encyclopedia/network/ddi-rule-4770
    DDI RULE 2586 NECURS - HTTP (Request) - Variant 4 Medium
    2022/07/06DDI RULE 2586/vinfo/kr/threat-encyclopedia/network/ddi-rule-2586
    DDI RULE 2573 MINER - TCP (Request) Medium
    2022/07/06DDI RULE 2573/vinfo/kr/threat-encyclopedia/network/ddi-rule-2573
    DDI RULE 4757 CVE-2022-26937 - NFS BUFFER OVERFLOW EXPLOIT - TCP(RESPONSE) High
    2022/07/05DDI RULE 4757/vinfo/kr/threat-encyclopedia/network/ddi-rule-4757
    DDI RULE 4641 CVE-2021-44228 - OGNL EXPLOIT - HTTP(REQUEST) Medium
    2022/06/29DDI RULE 4641/vinfo/kr/threat-encyclopedia/network/ddi-rule-4641
    DDI RULE 4753 CVE-2022-26809 - RPC INTEGER OVERFLOW - DCE(RESPONSE) High
    2022/06/20DDI RULE 4753/vinfo/kr/threat-encyclopedia/network/ddi-rule-4753
    DDI RULE 4750 CVE-2022-28213 - SAP XXE EXPLOIT - HTTP(REQUEST) High
    2022/06/15DDI RULE 4750/vinfo/kr/threat-encyclopedia/network/ddi-rule-4750
    DDI RULE 4699 ENVELOPE SQL INJECTION - HTTP (REQUEST) - Variant 2 High
    2022/06/13DDI RULE 4699/vinfo/kr/threat-encyclopedia/network/ddi-rule-4699
    DDI RULE 4696 BLIND SSRF EXPLOIT - HTTP(REQUEST) High
    2022/06/09DDI RULE 4696/vinfo/kr/threat-encyclopedia/network/ddi-rule-4696
    DDI RULE 4694 OGNL REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) High
    2022/06/07DDI RULE 4694/vinfo/kr/threat-encyclopedia/network/ddi-rule-4694
    DDI RULE 4692 CVE-2019-18935 - TELERIK UI RCE - HTTP(REQUEST) High
    2022/06/01DDI RULE 4692/vinfo/kr/threat-encyclopedia/network/ddi-rule-4692
    DDI RULE 4689 POSSIBLE SQL INJECT RCE EXPLOIT - HTTP (SEN) - Variant 2 Medium
    2022/05/27DDI RULE 4689/vinfo/kr/threat-encyclopedia/network/ddi-rule-4689
    DDI RULE 4691 CVE-2022-21907 - RCE EXPLOIT - HTTP (REQUEST) - Variant 2 Medium
    2022/05/24DDI RULE 4691/vinfo/kr/threat-encyclopedia/network/ddi-rule-4691
    DDI RULE 2341 COBALTSTRIKE - HTTP (Request) High
    2022/05/19DDI RULE 2341/vinfo/kr/threat-encyclopedia/network/ddi-rule-2341
    DDI RULE 4690 CVE-2021-4039 - ZYXEL NWA COMMAND INJECTION - HTTP(REQUEST) High
    2022/05/18DDI RULE 4690/vinfo/kr/threat-encyclopedia/network/ddi-rule-4690
    DDI RULE 4687 METASPLOIT COBALTSTRIKE STAGER - HTTP(RESPONSE) High
    2022/05/12DDI RULE 4687/vinfo/kr/threat-encyclopedia/network/ddi-rule-4687
    DDI RULE 4685 CVE-2021-22204 - REMOTE CODE EXECUTION - HTTP(EXPLOIT) High
    2022/05/10DDI RULE 4685/vinfo/kr/threat-encyclopedia/network/ddi-rule-4685
    DDI RULE 4609 PAYLOADBIN - HTTP (REQUEST) - Variant 1 High
    2022/05/05DDI RULE 4609/vinfo/kr/threat-encyclopedia/network/ddi-rule-4609
    DDI RULE 4686 RATSNIF - HTTP(REQUEST) High
    2022/05/02DDI RULE 4686/vinfo/kr/threat-encyclopedia/network/ddi-rule-4686
    DDI RULE 4683 CVE-2022-24491 - NFS BUFFER OVERFLOW EXPLOIT - UDP(REQUEST) High
    2022/04/26DDI RULE 4683/vinfo/kr/threat-encyclopedia/network/ddi-rule-4683
    DDI RULE 4684 CVE-2022-22954 - WORKSPACE ONE RCE - HTTP(REQUEST) High
    2022/04/25DDI RULE 4684/vinfo/kr/threat-encyclopedia/network/ddi-rule-4684
    DDI RULE 4599 KASEYA AUTHBYPASS EXPLOIT - HTTP(REQUEST) High
    2022/04/21DDI RULE 4599/vinfo/kr/threat-encyclopedia/network/ddi-rule-4599
    DDI RULE 4570 COBALTSTRIKE - DNS (Response) - Variant 2 High
    2022/04/19DDI RULE 4570/vinfo/kr/threat-encyclopedia/network/ddi-rule-4570
    DDI RULE 4462 Metasploit (Payload) - RC4 Encrypted Reverse TCP - TCP (Request) Medium
    2022/04/12DDI RULE 4462/vinfo/kr/threat-encyclopedia/network/ddi-rule-4462
    DDI RULE 4662 Metasploit(Payload) - Reverse DLL Inject - TCP (Response) - Variant 2 High
    2022/04/11DDI RULE 4662/vinfo/kr/threat-encyclopedia/network/ddi-rule-4662
    DDI RULE 4681 CVE-2018-8174 - REMOTE CODE EXECUTION - HTTP(RESPONSE) High
    2022/04/04DDI RULE 4681/vinfo/kr/threat-encyclopedia/network/ddi-rule-4681
    DDI RULE 4679 POSSIBLE JAVA CLASSLOADER RCE EXPLOIT - HTTP(REQUEST) Low
    2022/04/01DDI RULE 4679/vinfo/kr/threat-encyclopedia/network/ddi-rule-4679
    DDI RULE 4676 TELLYOUTHEPASS - HTTP(REQUEST) High
    2022/03/29DDI RULE 4676/vinfo/kr/threat-encyclopedia/network/ddi-rule-4676
    DDI RULE 4675 CVE-2022-0435 - TIPC BUFFEROVERFLOW EXPLOIT - UDP(REQUEST) Medium
    2022/03/24DDI RULE 4675/vinfo/kr/threat-encyclopedia/network/ddi-rule-4675
    DDI RULE 4668 CVE-2020-17144 - REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) High
    2022/03/23DDI RULE 4668/vinfo/kr/threat-encyclopedia/network/ddi-rule-4668
    DDI RULE 4674 TOOL PDQDEPLOY - SMB2(REQUEST) Low
    2022/03/21DDI RULE 4674/vinfo/kr/threat-encyclopedia/network/ddi-rule-4674
    DDI RULE 4672 COBALT STRIKE DEFAULT NAMED PIPE - SMB2(REQUEST) Low
    2022/03/17DDI RULE 4672/vinfo/kr/threat-encyclopedia/network/ddi-rule-4672
    DDI RULE 4671 CVE-2022-24112 - APACHE APISIX RCE - HTTP(REQUEST) High
    2022/03/14DDI RULE 4671/vinfo/kr/threat-encyclopedia/network/ddi-rule-4671
    DDI RULE 4670 CVE-2021-44077 - REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) High
    2022/03/07DDI RULE 4670/vinfo/kr/threat-encyclopedia/network/ddi-rule-4670
    DDI RULE 4669 PURPLE FOX ROOTKIT DOWNLOAD - HTTP(REQUEST) High
    2022/03/07DDI RULE 4669/vinfo/kr/threat-encyclopedia/network/ddi-rule-4669
    DDI RULE 4667 PURPLEFOX ROOTKIT - TCP(REQUEST) High
    2022/03/02DDI RULE 4667/vinfo/kr/threat-encyclopedia/network/ddi-rule-4667
    DDI RULE 4665 PURPLEFOX ROOTKIT DOWNLOAD - HTTP(RESPONSE) High
    2022/02/28DDI RULE 4665/vinfo/kr/threat-encyclopedia/network/ddi-rule-4665
    DDI RULE 4666 CVE-2022-24086 - INPUT VALIDATION EXPLOIT - HTTP(REQUEST) High
    2022/02/28DDI RULE 4666/vinfo/kr/threat-encyclopedia/network/ddi-rule-4666
    DDI RULE 4664 CVE-2021-40870 - DIRECTORY TRAVERSAL - HTTP(REQUEST) High
    2022/02/24DDI RULE 4664/vinfo/kr/threat-encyclopedia/network/ddi-rule-4664
    DDI RULE 4663 CVE-2021-25296 - NAGIOSXI CMD INJECTION EXPLOIT - HTTP(REQUEST) High
    2022/02/24DDI RULE 4663/vinfo/kr/threat-encyclopedia/network/ddi-rule-4663
    DDI RULE 4661 Possible CVE-2020-11978 - APACHE AIRFLOW RCE EXPLOIT - HTTP(REQUEST) Low
    2022/02/21DDI RULE 4661/vinfo/kr/threat-encyclopedia/network/ddi-rule-4661
    DDI RULE 4659 CVE-2021-44142 - BUFFER OVERFLOW EXPLOIT - SMB2(REQUEST) High
    2022/02/15DDI RULE 4659/vinfo/kr/threat-encyclopedia/network/ddi-rule-4659
    DDI RULE 4660 CVE-2020-14864 - DIRECTORY TRAVERSAL EXPLOIT - HTTP(REQUEST) High
    2022/02/14DDI RULE 4660/vinfo/kr/threat-encyclopedia/network/ddi-rule-4660
    DDI RULE 4656 CONTENTTYPE MESSAGEBODY MISMATCH - HTTP(RESPONSE) Low
    2022/02/07DDI RULE 4656/vinfo/kr/threat-encyclopedia/network/ddi-rule-4656
    DDI RULE 4658 CVE-2022-21907 - HTTP STACK RCE EXPLOIT - HTTP(REQUEST) Low
    2022/01/26DDI RULE 4658/vinfo/kr/threat-encyclopedia/network/ddi-rule-4658
    DDI RULE 4655 MAGNIBER - HTTP(REQUEST) High
    2022/01/19DDI RULE 4655/vinfo/kr/threat-encyclopedia/network/ddi-rule-4655
    DDI RULE 4651 CVE-2021-44790 - APACHE BUFFER OVERFLOW EXPLOIT - HTTP(REQUEST) High
    2022/01/13DDI RULE 4651/vinfo/kr/threat-encyclopedia/network/ddi-rule-4651
    DDI RULE 4650 NWORM - TCP(REQUEST) High
    2022/01/05DDI RULE 4650/vinfo/kr/threat-encyclopedia/network/ddi-rule-4650
    DDI RULE 4649 CVE-2021-44832 - LOG4J EXPLOIT - HTTP(REQUEST) High
    2021/12/30DDI RULE 4649/vinfo/kr/threat-encyclopedia/network/ddi-rule-4649
    DDI RULE 4645 CVE-2021-42287 - KDC VULNERABILITY - LDAP(REQUEST) High
    2021/12/29DDI RULE 4645/vinfo/kr/threat-encyclopedia/network/ddi-rule-4645
    DDI RULE 4647 SUNCRYPT - HTTP(REQUEST) High
    2021/12/27DDI RULE 4647/vinfo/kr/threat-encyclopedia/network/ddi-rule-4647
    DDI RULE 4648 CVE-2021-45105 - OGNL EXPLOIT - HTTP(REQUEST) High
    2021/12/27DDI RULE 4648/vinfo/kr/threat-encyclopedia/network/ddi-rule-4648
    DDI RULE 4646 CONNECTWISE - DNS(RESPONSE) Low
    2021/12/22DDI RULE 4646/vinfo/kr/threat-encyclopedia/network/ddi-rule-4646
    DDI RULE 4642 POSSIBLE HTTP HEADER OGNL EXPRESSION EXPLOIT - HTTP(REQUEST) Medium
    2021/12/21DDI RULE 4642/vinfo/kr/threat-encyclopedia/network/ddi-rule-4642
    DDI RULE 4644 POSSIBLE HTTP URI OGNL EXPRESSION EXPLOIT - HTTP (REQUEST) - Variant 3 Medium
    2021/12/18DDI RULE 4644/vinfo/kr/threat-encyclopedia/network/ddi-rule-4644
    DDI RULE 4643 POSSIBLE HTTP BODY OGNL EXPRESSION EXPLOIT - HTTP (REQUEST) - Variant 2 Medium
    2021/12/13DDI RULE 4643/vinfo/kr/threat-encyclopedia/network/ddi-rule-4643
    DDI RULE 4639 CVE-2019-5544 - VMWARE OPENSLP RCE EXPLOIT - UDP(REQUEST) High
    2021/12/02DDI RULE 4639/vinfo/kr/threat-encyclopedia/network/ddi-rule-4639
    DDI RULE 4640 CVE-2021-42321 - EXCHANGE RCE EXPLOIT - HTTP(REQUEST) High
    2021/11/26DDI RULE 4640/vinfo/kr/threat-encyclopedia/network/ddi-rule-4640
    DDI RULE 4638 BAZARLOADER - DNS(RESPONSE) High
    2021/11/17DDI RULE 4638/vinfo/kr/threat-encyclopedia/network/ddi-rule-4638
    DDI RULE 4637 BAZARLOADER - HTTP(RESPONSE) High
    2021/11/15DDI RULE 4637/vinfo/kr/threat-encyclopedia/network/ddi-rule-4637
    DDI RULE 4636 QAKBOT - SMTP(REQUEST) High
    2021/11/10DDI RULE 4636/vinfo/kr/threat-encyclopedia/network/ddi-rule-4636
    DDI RULE 4635 QAKBOT - HTTP (RESPONSE) - Variant 2 High
    2021/11/02DDI RULE 4635/vinfo/kr/threat-encyclopedia/network/ddi-rule-4635
    DDI RULE 4634 Encryption Channel - HTTP(Request) High
    2021/10/27DDI RULE 4634/vinfo/kr/threat-encyclopedia/network/ddi-rule-4634
    DDI RULE 4257 ANTSWORD - HTTP (Request) - Variant 2 High
    2021/10/18DDI RULE 4257/vinfo/kr/threat-encyclopedia/network/ddi-rule-4257
    DDI RULE 2889 ANTSWORD - HTTP (Request) High
    2021/10/18DDI RULE 2889/vinfo/kr/threat-encyclopedia/network/ddi-rule-2889
    DDI RULE 40 Unregistered service Low
    2021/10/18DDI RULE 40/vinfo/kr/threat-encyclopedia/network/ddi-rule-40
    DDI RULE 4633 CVE-2021-41773 - APACHE TRAVERSAL RCE EXPLOIT - HTTP(REQUEST) High
    2021/10/13DDI RULE 4633/vinfo/kr/threat-encyclopedia/network/ddi-rule-4633
    DDI RULE 4632 ZLOADER - DNS(RESPONSE) High
    2021/10/12DDI RULE 4632/vinfo/kr/threat-encyclopedia/network/ddi-rule-4632
    DDI RULE 4631 DULLDOWN - HTTP(REQUEST) High
    2021/10/11DDI RULE 4631/vinfo/kr/threat-encyclopedia/network/ddi-rule-4631
    DDI RULE 1063 APT - DARKCOMET - TCP High
    2021/10/07DDI RULE 1063/vinfo/kr/threat-encyclopedia/network/ddi-rule-1063
    DDI RULE 4604 PETITPOTAM EFS NTLM RELAY ATTACK - SMB2(RESPONSE) High
    2021/10/06DDI RULE 4604/vinfo/kr/threat-encyclopedia/network/ddi-rule-4604
    DDI RULE 4485 CVE-2020-14882 - Oracle WebLogic Remote Code Execution Exploit - HTTP (Request) High
    2021/10/04DDI RULE 4485/vinfo/kr/threat-encyclopedia/network/ddi-rule-4485
    DDI RULE 4630 CVE-2021-22005 VCENTER DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2021/09/29DDI RULE 4630/vinfo/kr/threat-encyclopedia/network/ddi-rule-4630
    DDI RULE 4629 TRANSFER BASE64ENCODE PE FILE - HTTP(RESPONSE) High
    2021/09/27DDI RULE 4629/vinfo/kr/threat-encyclopedia/network/ddi-rule-4629
    DDI RULE 4528 Possible Wget Commandline Injection Medium
    2021/09/21DDI RULE 4528/vinfo/kr/threat-encyclopedia/network/ddi-rule-4528
    DDI RULE 4627 BLACKMATTER - HTTP(REQUEST) High
    2021/09/20DDI RULE 4627/vinfo/kr/threat-encyclopedia/network/ddi-rule-4627
    DDI RULE 4628 POWEMUDDY - HTTP(REQUEST) High
    2021/09/16DDI RULE 4628/vinfo/kr/threat-encyclopedia/network/ddi-rule-4628
    DDI RULE 4625 Possible HTTP SMUGGLING - HTTP(REQUEST) High
    2021/09/16DDI RULE 4625/vinfo/kr/threat-encyclopedia/network/ddi-rule-4625
    DDI RULE 4626 DONOFF - DNS(RESPONSE) High
    2021/09/14DDI RULE 4626/vinfo/kr/threat-encyclopedia/network/ddi-rule-4626
    DDI RULE 4152 COBALTSTRIKE - HTTP (Response) High
    2021/09/14DDI RULE 4152/vinfo/kr/threat-encyclopedia/network/ddi-rule-4152
    DDI RULE 4624 CVE-2021-31207 - EXCHANGE EXPLOIT - HTTP(RESPONSE) High
    2021/09/08DDI RULE 4624/vinfo/kr/threat-encyclopedia/network/ddi-rule-4624
    DDI RULE 4623 CVE-2021-26084 - CONFLUENCE OGNL RCE EXPLOIT - HTTP(REQUEST) High
    2021/09/07DDI RULE 4623/vinfo/kr/threat-encyclopedia/network/ddi-rule-4623
    DDI RULE 4621 CVE-2021-37161 - PTS SWISSLOG BUFFER OVERFLOW EXPLOIT - UDP (Request) Medium
    2021/09/06DDI RULE 4621/vinfo/kr/threat-encyclopedia/network/ddi-rule-4621
    DDI RULE 4622 CVE-2021-37164 - PTS SWISSLOG BUFFER OVERFLOW EXPLOIT - UDP (Request) Medium
    2021/09/06DDI RULE 4622/vinfo/kr/threat-encyclopedia/network/ddi-rule-4622
    DDI RULE 2184 Possible Successful Logon Connection - RDP (Request) Low
    2021/09/06DDI RULE 2184/vinfo/kr/threat-encyclopedia/network/ddi-rule-2184
    DDI RULE 1200 Possible SYN Flood Detected Low
    2021/09/06DDI RULE 1200/vinfo/kr/threat-encyclopedia/network/ddi-rule-1200
    DDI RULE 4558 REDLINE - HTTP (REQUEST) High
    2021/09/02DDI RULE 4558/vinfo/kr/threat-encyclopedia/network/ddi-rule-4558
    DDI RULE 4620 CVE-2021-22123 - FORTINET RCE - HTTP(EXPLOIT) High
    2021/08/31DDI RULE 4620/vinfo/kr/threat-encyclopedia/network/ddi-rule-4620
    DDI RULE 4342 CVE-2020-7247 - OPENSMTPD RCE EXPLOIT - SMTP (REQUEST) High
    2021/08/26DDI RULE 4342/vinfo/kr/threat-encyclopedia/network/ddi-rule-4342
    DDI RULE 4618 ICEID - HTTP(REQUEST) High
    2021/08/25DDI RULE 4618/vinfo/kr/threat-encyclopedia/network/ddi-rule-4618
    DDI RULE 4619 NEGASTEAL - FTP(REQUEST) High
    2021/08/23DDI RULE 4619/vinfo/kr/threat-encyclopedia/network/ddi-rule-4619
    DDI RULE 4617 SIP POSSIBLE BRUTEFORCE - UDP(RESPONSE) Medium
    2021/08/23DDI RULE 4617/vinfo/kr/threat-encyclopedia/network/ddi-rule-4617
    DDI RULE 4576 CVE-2021-31166 - HTTP Protocol RCE Exploit - HTTP (REQUEST) High
    2021/08/23DDI RULE 4576/vinfo/kr/threat-encyclopedia/network/ddi-rule-4576
    DDI RULE 4616 POSSIBLE ZEPPELIN - HTTP(REQUEST) High
    2021/08/19DDI RULE 4616/vinfo/kr/threat-encyclopedia/network/ddi-rule-4616
    DDI RULE 4615 ZEPPELIN - HTTP(REQUEST) High
    2021/08/18DDI RULE 4615/vinfo/kr/threat-encyclopedia/network/ddi-rule-4615
    DDI RULE 4612 MGCP POSSIBLE EXFIL - UDP(REQUEST) Medium
    2021/08/18DDI RULE 4612/vinfo/kr/threat-encyclopedia/network/ddi-rule-4612
    DDI RULE 4614 SNMP POSSIBLE BRUTEFORCE - UDP(REQUEST) Low
    2021/08/17DDI RULE 4614/vinfo/kr/threat-encyclopedia/network/ddi-rule-4614
    DDI RULE 4613 CVE-2021-31195 - EXCHANGE XSS - HTTP(EXPLOIT) High
    2021/08/16DDI RULE 4613/vinfo/kr/threat-encyclopedia/network/ddi-rule-4613
    DDI RULE 4593 CVE-2021-34473 - EXCHANGE SSRF EXPLOIT - HTTP(REQUEST) High
    2021/08/12DDI RULE 4593/vinfo/kr/threat-encyclopedia/network/ddi-rule-4593
    DDI RULE 4611 CVE-2021-26432 - NFS BUFFEROVERLOW EXPLOIT - UDP(REQUEST) High
    2021/08/11DDI RULE 4611/vinfo/kr/threat-encyclopedia/network/ddi-rule-4611
    DDI RULE 4589 Possible CVE-2021-34527 - Windows Print Spooler RCE - DCE (Request) Low
    2021/08/10DDI RULE 4589/vinfo/kr/threat-encyclopedia/network/ddi-rule-4589
    DDI RULE 4602 NBT-NS Query Response Medium
    2021/08/05DDI RULE 4602/vinfo/kr/threat-encyclopedia/network/ddi-rule-4602
    DDI RULE 4605 PAYLOADBIN - HTTP(REQUEST) High
    2021/08/03DDI RULE 4605/vinfo/kr/threat-encyclopedia/network/ddi-rule-4605
    DDI RULE 4601 LLMNR Query Response Medium
    2021/07/29DDI RULE 4601/vinfo/kr/threat-encyclopedia/network/ddi-rule-4601
    DDI RULE 4603 ApexOne File Upload Exploit- HTTP(REQUEST) High
    2021/07/27DDI RULE 4603/vinfo/kr/threat-encyclopedia/network/ddi-rule-4603
    DDI RULE 4594 COBALTSTRIKE - HTTP(REQUEST) - Variant 3 High
    2021/07/27DDI RULE 4594/vinfo/kr/threat-encyclopedia/network/ddi-rule-4594
    DDI RULE 4597 HACKADEMY - HTTP(RESPONSE) High
    2021/07/21DDI RULE 4597/vinfo/kr/threat-encyclopedia/network/ddi-rule-4597
    DDI RULE 4598 CVE-2021-3129 - LARAVEL RCE EXPLOIT - HTTP(REQUEST) High
    2021/07/21DDI RULE 4598/vinfo/kr/threat-encyclopedia/network/ddi-rule-4598
    DDI RULE 4596 LOADSELL - HTTP(REQUEST) High
    2021/07/20DDI RULE 4596/vinfo/kr/threat-encyclopedia/network/ddi-rule-4596
    DDI RULE 4595 NJRAT - TCP (REQUEST) - Variant 2 High
    2021/07/19DDI RULE 4595/vinfo/kr/threat-encyclopedia/network/ddi-rule-4595
    DDI RULE 4531 RPC SECRETSDUMP DCSYNC - DCE (REQUEST) Medium
    2021/07/19DDI RULE 4531/vinfo/kr/threat-encyclopedia/network/ddi-rule-4531
    DDI RULE 4581 STOP - HTTP (REQUEST) High
    2021/07/15DDI RULE 4581/vinfo/kr/threat-encyclopedia/network/ddi-rule-4581
    DDI RULE 4592 REDLINE - HTTP(RESPONSE) High
    2021/07/14DDI RULE 4592/vinfo/kr/threat-encyclopedia/network/ddi-rule-4592
    DDI RULE 4588 Possible CVE-2021-34527 - Windows Print Spooler RCE - SMB (Request) Low
    2021/07/12DDI RULE 4588/vinfo/kr/threat-encyclopedia/network/ddi-rule-4588
    DDI RULE 4591 REVIL - HTTP(REQUEST) High
    2021/07/12DDI RULE 4591/vinfo/kr/threat-encyclopedia/network/ddi-rule-4591
    DDI RULE 1109 TDSS - HTTP (Request) High
    2021/07/01DDI RULE 1109/vinfo/kr/threat-encyclopedia/network/ddi-rule-1109
    DDI RULE 4483 Remote Access Tool - VNC (Request) High
    2021/06/23DDI RULE 4483/vinfo/kr/threat-encyclopedia/network/ddi-rule-4483
    DDI RULE 4587 REVENGERAT - TCP(REQUEST) High
    2021/06/21DDI RULE 4587/vinfo/kr/threat-encyclopedia/network/ddi-rule-4587
    DDI RULE 2007 URSNIF - HTTP (Request) - Variant 3 High
    2021/06/17DDI RULE 2007/vinfo/kr/threat-encyclopedia/network/ddi-rule-2007
    DDI RULE 4586 Remote Tools Certificate - SSL Medium
    2021/06/15DDI RULE 4586/vinfo/kr/threat-encyclopedia/network/ddi-rule-4586
    DDI RULE 4583 CVE-2021-21985 - VMWARE VSAN PLUGIN RCE EXPLOIT - HTTP (REQUEST) High
    2021/06/07DDI RULE 4583/vinfo/kr/threat-encyclopedia/network/ddi-rule-4583
    DDI RULE 4584 Malicious Certificate SHA1 Hash - SSL High
    2021/06/03DDI RULE 4584/vinfo/kr/threat-encyclopedia/network/ddi-rule-4584
    DDI RULE 4585 CVE-2017-12617 - APACHE TOMCAT PUT METHOD RCE - HTTP (REQUEST) Medium
    2021/06/03DDI RULE 4585/vinfo/kr/threat-encyclopedia/network/ddi-rule-4585
    DDI RULE 4582 LEMON DUCK - HTTP (REQUEST) High
    2021/06/03DDI RULE 4582/vinfo/kr/threat-encyclopedia/network/ddi-rule-4582
    DDI RULE 4571 Possible Suspicious Named Pipe - SMB2 (REQUEST) Medium
    2021/05/28DDI RULE 4571/vinfo/kr/threat-encyclopedia/network/ddi-rule-4571
    DDI RULE 4580 PROMETEI - HTTP (REQUEST) High
    2021/05/27DDI RULE 4580/vinfo/kr/threat-encyclopedia/network/ddi-rule-4580
    DDI RULE 4579 DENES - DNS (RESPONSE) High
    2021/05/26DDI RULE 4579/vinfo/kr/threat-encyclopedia/network/ddi-rule-4579
    DDI RULE 4572 GLUPTEBA - HTTP (REQUEST) High
    2021/05/25DDI RULE 4572/vinfo/kr/threat-encyclopedia/network/ddi-rule-4572
    DDI RULE 4577 MAGNIBER EK for Internet Explorer - HTTP (RESPONSE) High
    2021/05/24DDI RULE 4577/vinfo/kr/threat-encyclopedia/network/ddi-rule-4577
    DDI RULE 4578 CVE-2021-28482 - MS EXCHANGE DESERIALIZATION RCE EXPLOIT - HTTP (REQUEST) Medium
    2021/05/20DDI RULE 4578/vinfo/kr/threat-encyclopedia/network/ddi-rule-4578
    DDI RULE 4575 DENES - HTTP (REQUEST) High
    2021/05/20DDI RULE 4575/vinfo/kr/threat-encyclopedia/network/ddi-rule-4575
    DDI RULE 1541 EMOTET - HTTP (Request) High
    2021/05/18DDI RULE 1541/vinfo/kr/threat-encyclopedia/network/ddi-rule-1541
    DDI RULE 2348 CVE-2017-5638 - APACHE STRUTS EXPLOIT - HTTP (Request) High
    2021/05/12DDI RULE 2348/vinfo/kr/threat-encyclopedia/network/ddi-rule-2348
    DDI RULE 1642 CVE-2014-6278 - SHELLSHOCK HTTP Exploit High
    2021/05/12DDI RULE 1642/vinfo/kr/threat-encyclopedia/network/ddi-rule-1642
    DDI RULE 1618 CVE-2014-6271 - Shellshock HTTP Request High
    2021/05/12DDI RULE 1618/vinfo/kr/threat-encyclopedia/network/ddi-rule-1618
    DDI RULE 4573 CVE-2021-31181 - SHAREPOINT RCE EXPLOIT - HTTP (REQUEST) High
    2021/05/12DDI RULE 4573/vinfo/kr/threat-encyclopedia/network/ddi-rule-4573
    DDI RULE 4569 CVE-2021-27065 - MS EXCHANGE FILE WRITE RCE EXPLOIT - HTTP (REQUEST) Medium
    2021/05/11DDI RULE 4569/vinfo/kr/threat-encyclopedia/network/ddi-rule-4569
    DDI RULE 2034 RANSOM CRYPTESLA - HTTP (Request) - Variant 5 High
    2021/05/11DDI RULE 2034/vinfo/kr/threat-encyclopedia/network/ddi-rule-2034
    DDI RULE 2117 DEMOCRY - Ransomware - HTTP (Request) High
    2021/05/11DDI RULE 2117/vinfo/kr/threat-encyclopedia/network/ddi-rule-2117
    DDI RULE 4567 BOXTER - HTTP (RESPONSE) High
    2021/05/06DDI RULE 4567/vinfo/kr/threat-encyclopedia/network/ddi-rule-4567
    DDI RULE 4568 BOXTER - HTTP (REQUEST) High
    2021/05/06DDI RULE 4568/vinfo/kr/threat-encyclopedia/network/ddi-rule-4568
    DDI RULE 4565 CVE-2021-24085 - EXCHANGE CSRF EXPLOIT - HTTP (REQUEST) High
    2021/05/06DDI RULE 4565/vinfo/kr/threat-encyclopedia/network/ddi-rule-4565
    DDI RULE 2786 ThinkPHP 5x Remote Code Execution - HTTP (Request) High
    2021/05/04DDI RULE 2786/vinfo/kr/threat-encyclopedia/network/ddi-rule-2786
    DDI RULE 4566 CVE-2020-17047 - Network File System RPC DOS EXPLOIT - TCP (REQUEST) High
    2021/05/03DDI RULE 4566/vinfo/kr/threat-encyclopedia/network/ddi-rule-4566
    DDI RULE 4564 CVE-2020-8243 - PULSE RCE EXPLOIT - HTTP (REQUEST) High
    2021/04/29DDI RULE 4564/vinfo/kr/threat-encyclopedia/network/ddi-rule-4564
    DDI RULE 4560 CVE-2021-20023 - SONICWALL DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2021/04/28DDI RULE 4560/vinfo/kr/threat-encyclopedia/network/ddi-rule-4560
    DDI RULE 4562 CVE-2019-9670 - ZIMBRA SUITE XXE EXPLOIT - HTTP (REQUEST) High
    2021/04/28DDI RULE 4562/vinfo/kr/threat-encyclopedia/network/ddi-rule-4562
    DDI RULE 4563 CVE-2020-8260 - PULSE RCE EXPLOIT - HTTP (REQUEST) High
    2021/04/26DDI RULE 4563/vinfo/kr/threat-encyclopedia/network/ddi-rule-4563
    DDI RULE 4561 CVE-2020-4006 - VMWARE CONFIGURATOR COMMAND INJECTION - HTTP (REQUEST) High
    2021/04/26DDI RULE 4561/vinfo/kr/threat-encyclopedia/network/ddi-rule-4561
    DDI RULE 4559 CVE-2019-11510 - PULSE INFORMATION DISCLOSURE - HTTP (REQUEST) High
    2021/04/26DDI RULE 4559/vinfo/kr/threat-encyclopedia/network/ddi-rule-4559
    DDI RULE 4551 CVE-2021-21975 - VREALIZE API SSRF EXPLOIT - HTTP (REQUEST) Low
    2021/04/21DDI RULE 4551/vinfo/kr/threat-encyclopedia/network/ddi-rule-4551
    DDI RULE 4557 PANDASTEALER - HTTP (REQUEST) High
    2021/04/21DDI RULE 4557/vinfo/kr/threat-encyclopedia/network/ddi-rule-4557
    DDI RULE 4550 POSSIBLE PASSWORD SPRAY - LDAP (RESPONSE) Medium
    2021/04/19DDI RULE 4550/vinfo/kr/threat-encyclopedia/network/ddi-rule-4550
    DDI RULE 4555 CVE-2018-13374 - FORTIOS INFORMATION DISCLOSURE - HTTP (REQUEST) High
    2021/04/19DDI RULE 4555/vinfo/kr/threat-encyclopedia/network/ddi-rule-4555
    DDI RULE 4556 Possible CVE-2018-13374 - FORTIOS INFORMATION DISCLOSURE - HTTP (REQUEST) Low
    2021/04/19DDI RULE 4556/vinfo/kr/threat-encyclopedia/network/ddi-rule-4556
    DDI RULE 4553 CVE-2018-13379 - FORTIOS DIRECTORY TRAVERSAL - HTTP (REQUEST) High
    2021/04/15DDI RULE 4553/vinfo/kr/threat-encyclopedia/network/ddi-rule-4553
    DDI RULE 4554 RCLONE - HTTP (REQUEST) High
    2021/04/15DDI RULE 4554/vinfo/kr/threat-encyclopedia/network/ddi-rule-4554
    DDI RULE 1561 APT - PLUGX Malformed request - DNS High
    2021/04/15DDI RULE 1561/vinfo/kr/threat-encyclopedia/network/ddi-rule-1561
    DDI RULE 4552 CVE-2021-21983 - VREALIZE API FILE RCE EXPLOIT - HTTP (REQUEST) High
    2021/04/13DDI RULE 4552/vinfo/kr/threat-encyclopedia/network/ddi-rule-4552
    DDI RULE 4548 GET2 LOADER - HTTP (Request) High
    2021/04/07DDI RULE 4548/vinfo/kr/threat-encyclopedia/network/ddi-rule-4548
    DDI RULE 4549 CHOPPER - HTTP (Response) Medium
    2021/04/07DDI RULE 4549/vinfo/kr/threat-encyclopedia/network/ddi-rule-4549
    DDI RULE 4547 SDBOT - TCP (REQUEST) High
    2021/04/05DDI RULE 4547/vinfo/kr/threat-encyclopedia/network/ddi-rule-4547
    DDI RULE 4543 CVE-2021-25274 - Solarwinds Orion Remote Code Execution Exploit - TCP (REQUEST) High
    2021/03/25DDI RULE 4543/vinfo/kr/threat-encyclopedia/network/ddi-rule-4543
    DDI RULE 4544 CVE-2021-27561 - YEALINK RCE EXPLOIT - HTTP (REQUEST) High
    2021/03/25DDI RULE 4544/vinfo/kr/threat-encyclopedia/network/ddi-rule-4544
    DDI RULE 4545 CVE-2021-22502 - MICROFOCUS RCE EXPLOIT - HTTP (REQUEST) High
    2021/03/25DDI RULE 4545/vinfo/kr/threat-encyclopedia/network/ddi-rule-4545
    DDI RULE 4546 QUASAR - TCP (RESPONSE) High
    2021/03/25DDI RULE 4546/vinfo/kr/threat-encyclopedia/network/ddi-rule-4546
    DDI RULE 4456 File Upload through SMB or SMB2 Low
    2021/03/24DDI RULE 4456/vinfo/kr/threat-encyclopedia/network/ddi-rule-4456
    DDI RULE 4457 File Download through SMB or SMB2 Low
    2021/03/24DDI RULE 4457/vinfo/kr/threat-encyclopedia/network/ddi-rule-4457
    DDI RULE 4539 CVE-2020-17530 - APACHE STRUTS OGNL RCE EXPLOIT - HTTP (REQUEST) High
    2021/03/24DDI RULE 4539/vinfo/kr/threat-encyclopedia/network/ddi-rule-4539
    DDI RULE 4540 CVE-2021-22991 - F5 BIG-IP TSM BUFFER OVERFLOW EXPLOIT - HTTP(REQUEST) High
    2021/03/24DDI RULE 4540/vinfo/kr/threat-encyclopedia/network/ddi-rule-4540
    DDI RULE 4541 CVE-2021-22992 - F5 BIG-IP ASM BUFFER OVERFLOW EXPLOIT - HTTP(RESPONSE) High
    2021/03/24DDI RULE 4541/vinfo/kr/threat-encyclopedia/network/ddi-rule-4541
    DDI RULE 4542 CVE-2021-22986 - F5 BIG-IP iCONTROL RCE EXPLOIT - HTTP(REQUEST) High
    2021/03/24DDI RULE 4542/vinfo/kr/threat-encyclopedia/network/ddi-rule-4542
    DDI RULE 4538 CVE-2020-17518 - APACHE FLINK DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2021/03/23DDI RULE 4538/vinfo/kr/threat-encyclopedia/network/ddi-rule-4538
    DDI RULE 2598 PsExec PETYA - Ransomware - SMB2 High
    2021/03/23DDI RULE 2598/vinfo/kr/threat-encyclopedia/network/ddi-rule-2598
    DDI RULE 4516 MESTRE - IRC (REQUEST) High
    2021/03/23DDI RULE 4516/vinfo/kr/threat-encyclopedia/network/ddi-rule-4516
    DDI RULE 2021 NUCLEAR - Exploit kit - HTTP (Request) - Variant 3 Medium
    2021/03/22DDI RULE 2021/vinfo/kr/threat-encyclopedia/network/ddi-rule-2021
    DDI RULE 4504 LOKIBOT - HTTP (REQUEST) High
    2021/03/18DDI RULE 4504/vinfo/kr/threat-encyclopedia/network/ddi-rule-4504
    DDI RULE 4239 CVE-2019-16759 - VBulletin Remote Command Execution - HTTP (Request) High
    2021/03/17DDI RULE 4239/vinfo/kr/threat-encyclopedia/network/ddi-rule-4239
    DDI RULE 4536 APT - MANGZAMEL - TCP (Request) High
    2021/03/17DDI RULE 4536/vinfo/kr/threat-encyclopedia/network/ddi-rule-4536
    DDI RULE 4537 CVE-2020-5847 - UNRAID RCE EXPLOIT - HTTP (REQUEST) High
    2021/03/16DDI RULE 4537/vinfo/kr/threat-encyclopedia/network/ddi-rule-4537
    DDI RULE 4525 CVE-2021-21972 - VSPHERE RCE EXPLOIT - HTTP (REQUEST) High
    2021/03/16DDI RULE 4525/vinfo/kr/threat-encyclopedia/network/ddi-rule-4525
    DDI RULE 4529 APT - REMOTE EXECUTION ZABBIX - TCP (REQUEST) High
    2021/03/16DDI RULE 4529/vinfo/kr/threat-encyclopedia/network/ddi-rule-4529
    DDI RULE 4530 DCERPC WMIEXECPY - (REQUEST) High
    2021/03/16DDI RULE 4530/vinfo/kr/threat-encyclopedia/network/ddi-rule-4530
    DDI RULE 4533 CVE-2021-26877 - RCE EXPLOIT - DNS (REQUEST) High
    2021/03/15DDI RULE 4533/vinfo/kr/threat-encyclopedia/network/ddi-rule-4533
    DDI RULE 4534 CVE-2021-26897 - OVER TCP RCE EXPLOIT - DNS (REQUEST) High
    2021/03/15DDI RULE 4534/vinfo/kr/threat-encyclopedia/network/ddi-rule-4534
    DDI RULE 4535 CVE-2021-27076 - Sharepoint Remote Code Execution Exploit - HTTP (REQUEST) High
    2021/03/15DDI RULE 4535/vinfo/kr/threat-encyclopedia/network/ddi-rule-4535
    DDI RULE 2057 CRYDAP - Ransomware - HTTP (Request) High
    2021/03/11DDI RULE 2057/vinfo/kr/threat-encyclopedia/network/ddi-rule-2057
    DDI RULE 2452 Wget Commandline Injection Medium
    2021/03/10DDI RULE 2452/vinfo/kr/threat-encyclopedia/network/ddi-rule-2452
    DDI RULE 4526 DEWMODE - HTTP (REQUEST) High
    2021/03/10DDI RULE 4526/vinfo/kr/threat-encyclopedia/network/ddi-rule-4526
    DDI RULE 4527 CVE-2021-26855 - Exchange Server Side Request Forgery Exploit SB - HTTP (REQUEST) High
    2021/03/09DDI RULE 4527/vinfo/kr/threat-encyclopedia/network/ddi-rule-4527
    DDI RULE 4523 Fobushell - HTTP (Request) High
    2021/03/03DDI RULE 4523/vinfo/kr/threat-encyclopedia/network/ddi-rule-4523
    DDI RULE 4524 Possible Renamed PSEXEC Service - SMB2 (Request) Medium
    2021/03/03DDI RULE 4524/vinfo/kr/threat-encyclopedia/network/ddi-rule-4524
    DDI RULE 4522 CVE-2021-24072 - SHAREPOINT RCE EXPLOIT - HTTP (REQUEST) High
    2021/02/15DDI RULE 4522/vinfo/kr/threat-encyclopedia/network/ddi-rule-4522
    DDI RULE 4520 CVE-2021-24078 - Remote Comand Execution Exploit - DNS (RESPONSE) High
    2021/02/11DDI RULE 4520/vinfo/kr/threat-encyclopedia/network/ddi-rule-4520
    DDI RULE 4521 CVE-2021-1707 - Sharepoint Remote Code Execution Exploit - HTTP (REQUEST) High
    2021/02/11DDI RULE 4521/vinfo/kr/threat-encyclopedia/network/ddi-rule-4521
    DDI RULE 2472 CARBANAK - DNS (Response) High
    2021/02/11DDI RULE 2472/vinfo/kr/threat-encyclopedia/network/ddi-rule-2472
    DDI RULE 1542 Possible CONFICKER DNS Response High
    2021/02/11DDI RULE 1542/vinfo/kr/threat-encyclopedia/network/ddi-rule-1542
    DDI RULE 1543 Possible CRILOCK DNS Response High
    2021/02/11DDI RULE 1543/vinfo/kr/threat-encyclopedia/network/ddi-rule-1543
    DDI RULE 1544 Possible CAPHAW DNS Response High
    2021/02/11DDI RULE 1544/vinfo/kr/threat-encyclopedia/network/ddi-rule-1544
    DDI RULE 4518 Possible NAT Slipstreaming - TCP (Request) Medium
    2021/02/10DDI RULE 4518/vinfo/kr/threat-encyclopedia/network/ddi-rule-4518
    DDI RULE 4519 COBALTSTRIKE - HTTPS (REQUEST) High
    2021/02/09DDI RULE 4519/vinfo/kr/threat-encyclopedia/network/ddi-rule-4519
    DDI RULE 2544 JAWS Remote Code Execution Exploit - HTTP (Request) High
    2021/02/09DDI RULE 2544/vinfo/kr/threat-encyclopedia/network/ddi-rule-2544
    DDI RULE 4517 TORRENTLOCKER - HTTPS (REQUEST) High
    2021/02/02DDI RULE 4517/vinfo/kr/threat-encyclopedia/network/ddi-rule-4517
    DDI RULE 4512 TRICKBOT - HTTPS (REQUEST) High
    2021/02/02DDI RULE 4512/vinfo/kr/threat-encyclopedia/network/ddi-rule-4512
    DDI RULE 4513 EMPIRE - HTTPS (REQUEST) High
    2021/02/01DDI RULE 4513/vinfo/kr/threat-encyclopedia/network/ddi-rule-4513
    DDI RULE 4514 METASPLOIT - HTTPS (REQUEST) - Malicious SSL Connection High
    2021/02/01DDI RULE 4514/vinfo/kr/threat-encyclopedia/network/ddi-rule-4514
    DDI RULE 4515 QAKBOT - HTTP (RESPONSE) High
    2021/02/01DDI RULE 4515/vinfo/kr/threat-encyclopedia/network/ddi-rule-4515
    DDI RULE 4506 CVE-2021-2109 - Oracle WebLogic Remote Code Execution Exploit - HTTP (Request) High
    2021/01/28DDI RULE 4506/vinfo/kr/threat-encyclopedia/network/ddi-rule-4506
    DDI RULE 4507 GOOTKIT - HTTPS (REQUEST) High
    2021/01/28DDI RULE 4507/vinfo/kr/threat-encyclopedia/network/ddi-rule-4507
    DDI RULE 4508 GOZI - HTTPS (REQUEST) High
    2021/01/28DDI RULE 4508/vinfo/kr/threat-encyclopedia/network/ddi-rule-4508
    DDI RULE 4509 CVE-2019-11229 - Gitea Remote Code Execution Exploit - HTTP (Request) High
    2021/01/28DDI RULE 4509/vinfo/kr/threat-encyclopedia/network/ddi-rule-4509
    DDI RULE 4510 RANSOM TROLDESH - HTTPS (REQUEST) High
    2021/01/28DDI RULE 4510/vinfo/kr/threat-encyclopedia/network/ddi-rule-4510
    DDI RULE 4511 QUAKBOT - HTTPS (REQUEST) High
    2021/01/28DDI RULE 4511/vinfo/kr/threat-encyclopedia/network/ddi-rule-4511
    DDI RULE 4502 DRIDEX - HTTPS (REQUEST) High
    2021/01/27DDI RULE 4502/vinfo/kr/threat-encyclopedia/network/ddi-rule-4502
    DDI RULE 4505 RANSOM CRYPTOLOCK - HTTPS (REQUEST) High
    2021/01/27DDI RULE 4505/vinfo/kr/threat-encyclopedia/network/ddi-rule-4505
    DDI RULE 4503 SILENTNIGHT- ZLOADER - HTTP(RESPONSE) Medium
    2021/01/26DDI RULE 4503/vinfo/kr/threat-encyclopedia/network/ddi-rule-4503
    DDI RULE 4498 Sanfor EDR Remote Code Execution Exploit - HTTP (Request) High
    2021/01/25DDI RULE 4498/vinfo/kr/threat-encyclopedia/network/ddi-rule-4498
    DDI RULE 4467 APT - WATERTIGER - HTTP (Response) High
    2021/01/25DDI RULE 4467/vinfo/kr/threat-encyclopedia/network/ddi-rule-4467
    DDI RULE 4501 Too many FTP Error Code 421 - FTP (Response) Medium
    2021/01/20DDI RULE 4501/vinfo/kr/threat-encyclopedia/network/ddi-rule-4501
    DDI RULE 4490 XML External Entity File Disclosure - HTTP (Request) Medium
    2021/01/13DDI RULE 4490/vinfo/kr/threat-encyclopedia/network/ddi-rule-4490
    DDI RULE 1816 GATAK - HTTP (Request) - Variant 2 High
    2021/01/11DDI RULE 1816/vinfo/kr/threat-encyclopedia/network/ddi-rule-1816
    DDI RULE 4499 Top-App LB SQL Injection Exploit - HTTP (Request) High
    2020/12/29DDI RULE 4499/vinfo/kr/threat-encyclopedia/network/ddi-rule-4499
    DDI RULE 4500 GRP-u8 SQL Injection - HTTP (Request) High
    2020/12/28DDI RULE 4500/vinfo/kr/threat-encyclopedia/network/ddi-rule-4500
    DDI RULE 4497 SQL Injection Exploit - HTTP (Request) - Variant 2 Medium
    2020/12/28DDI RULE 4497/vinfo/kr/threat-encyclopedia/network/ddi-rule-4497
    DDI RULE 4494 CVE-2020-17051 - NFS Exploit - UDP (REQUEST) Medium
    2020/12/23DDI RULE 4494/vinfo/kr/threat-encyclopedia/network/ddi-rule-4494
    DDI RULE 4495 Potential Social Security Info on TXT/CSV attachment - HTTP (Request) Medium
    2020/12/23DDI RULE 4495/vinfo/kr/threat-encyclopedia/network/ddi-rule-4495
    DDI RULE 4496 Potential Credit Card Info on TXT/CSV attachment - HTTP (Request) Medium
    2020/12/23DDI RULE 4496/vinfo/kr/threat-encyclopedia/network/ddi-rule-4496
    DDI RULE 4453 CVE-2020-1472 - Zerologon Privilege Escalation - DCERPC (Request) High
    2020/12/23DDI RULE 4453/vinfo/kr/threat-encyclopedia/network/ddi-rule-4453
    DDI RULE 4493 CVE-2020-17121 - SHAREPOINT RCE EXPLOIT - HTTP (Request) Medium
    2020/12/21DDI RULE 4493/vinfo/kr/threat-encyclopedia/network/ddi-rule-4493
    DDI RULE 4492 SUPERNOVA WEBSHELL - HTTP (RESPONSE) High
    2020/12/17DDI RULE 4492/vinfo/kr/threat-encyclopedia/network/ddi-rule-4492
    DDI RULE 4491 SUNBURST - DNS (RESPONSE) High
    2020/12/15DDI RULE 4491/vinfo/kr/threat-encyclopedia/network/ddi-rule-4491
    DDI RULE 4486 CVE-2020-11974 - Apache DolphinScheduler Remote Code Execution Exploit - HTTP (Request) High
    2020/12/15DDI RULE 4486/vinfo/kr/threat-encyclopedia/network/ddi-rule-4486
    DDI RULE 4487 CVE-2020-5791 - Nagios XI Command Injection - HTTP (Request) High
    2020/12/15DDI RULE 4487/vinfo/kr/threat-encyclopedia/network/ddi-rule-4487
    DDI RULE 4488 CVE-2020-5398 - Spring Framework Reflected File Download Exploit - HTTP (Request) High
    2020/12/15DDI RULE 4488/vinfo/kr/threat-encyclopedia/network/ddi-rule-4488
    DDI RULE 4489 CVE-2019-8394 - ZOHO FILEUPLOAD EXPLOIT - HTTP (REQUEST) Medium
    2020/12/14DDI RULE 4489/vinfo/kr/threat-encyclopedia/network/ddi-rule-4489
    DDI RULE 4482 Browser Exploitation Framework Tool - HTTP (Request) Medium
    2020/12/14DDI RULE 4482/vinfo/kr/threat-encyclopedia/network/ddi-rule-4482
    DDI RULE 4484 GOLDENSPY - HTTP (REQUEST) High
    2020/12/14DDI RULE 4484/vinfo/kr/threat-encyclopedia/network/ddi-rule-4484
    DDI RULE 4447 Potential Credit Card Info on ICMP Echo - ICMP (Request) Medium
    2020/12/14DDI RULE 4447/vinfo/kr/threat-encyclopedia/network/ddi-rule-4447
    DDI RULE 1471 JACKPOS - HTTP (Request) High
    2020/12/14DDI RULE 1471/vinfo/kr/threat-encyclopedia/network/ddi-rule-1471
    DDI RULE 4481 SQL Injection Exploit - HTTP (Request) Medium
    2020/12/03DDI RULE 4481/vinfo/kr/threat-encyclopedia/network/ddi-rule-4481
    DDI RULE 2492 KARAGANY - HTTP (Request) High
    2020/12/02DDI RULE 2492/vinfo/kr/threat-encyclopedia/network/ddi-rule-2492
    DDI RULE 4478 CVE-2020-2551 - Oracle Weblogic Remote Code Execution Exploit - TCP (Request) High
    2020/11/26DDI RULE 4478/vinfo/kr/threat-encyclopedia/network/ddi-rule-4478
    DDI RULE 4479 NTLM v1 Authentication - SMB (Request) Medium
    2020/11/24DDI RULE 4479/vinfo/kr/threat-encyclopedia/network/ddi-rule-4479
    DDI RULE 4480 XXL-JOB Remote Code Execution Exploit - HTTP (REQUEST) High
    2020/11/24DDI RULE 4480/vinfo/kr/threat-encyclopedia/network/ddi-rule-4480
    DDI RULE 1706 LDAP SASL Connection Detected High
    2020/11/19DDI RULE 1706/vinfo/kr/threat-encyclopedia/network/ddi-rule-1706
    DDI RULE 4477 Remote System Discovery - LDAP (REQUEST) - Variant 2 High
    2020/11/11DDI RULE 4477/vinfo/kr/threat-encyclopedia/network/ddi-rule-4477
    DDI RULE 2713 AVTECH Command Injection - Multiple Exploits - HTTP (Request) High
    2020/11/10DDI RULE 2713/vinfo/kr/threat-encyclopedia/network/ddi-rule-2713
    DDI RULE 4476 WOL- Wake on lan - UDP (REQUEST) High
    2020/11/06DDI RULE 4476/vinfo/kr/threat-encyclopedia/network/ddi-rule-4476
    DDI RULE 2018 DUNIHI HTTP Response High
    2020/11/05DDI RULE 2018/vinfo/kr/threat-encyclopedia/network/ddi-rule-2018
    DDI RULE 4474 File renamed - RYUK - Ransomware - SMB (Request) High
    2020/11/03DDI RULE 4474/vinfo/kr/threat-encyclopedia/network/ddi-rule-4474
    DDI RULE 4475 File renamed - RYUK - Ransomware - SMB2 (Request) High
    2020/11/03DDI RULE 4475/vinfo/kr/threat-encyclopedia/network/ddi-rule-4475
    DDI RULE 4473 MSXSL Code Execution - HTTP (Response) Medium
    2020/11/02DDI RULE 4473/vinfo/kr/threat-encyclopedia/network/ddi-rule-4473
    DDI RULE 4471 CVE-2016-4977 - Spring Security OAuth Remote Code Execution Exploit - HTTP (Request) Medium
    2020/10/29DDI RULE 4471/vinfo/kr/threat-encyclopedia/network/ddi-rule-4471
    DDI RULE 4472 POSSIBLE NGROK - HTTPS (REQUEST) Medium
    2020/10/27DDI RULE 4472/vinfo/kr/threat-encyclopedia/network/ddi-rule-4472
    DDI RULE 4470 CVE-2020-16952 - Microsoft SharePoint Remote Code Execution - HTTP (Request) High
    2020/10/26DDI RULE 4470/vinfo/kr/threat-encyclopedia/network/ddi-rule-4470
    DDI RULE 1068 APT - GHOSTRAT - TCP High
    2020/10/26DDI RULE 1068/vinfo/kr/threat-encyclopedia/network/ddi-rule-1068
    DDI RULE 4469 APT - COBALTSRIKE - HTTP (RESPONSE) High
    2020/10/19DDI RULE 4469/vinfo/kr/threat-encyclopedia/network/ddi-rule-4469
    DDI RULE 4222 PST File Upload Low
    2020/10/19DDI RULE 4222/vinfo/kr/threat-encyclopedia/network/ddi-rule-4222
    DDI RULE 2247 DEMO RULE - SMB (Request) High
    2020/10/19DDI RULE 2247/vinfo/kr/threat-encyclopedia/network/ddi-rule-2247
    DDI RULE 2333 CVE-2017-0016 - Tree Connect Denial of Service Exploit - SMB2 (Response) High
    2020/10/19DDI RULE 2333/vinfo/kr/threat-encyclopedia/network/ddi-rule-2333
    DDI RULE 4468 CVE-2020-16898 - EXPLOIT - ICMPv6 (REQUEST) High
    2020/10/15DDI RULE 4468/vinfo/kr/threat-encyclopedia/network/ddi-rule-4468
    DDI RULE 4466 PsExec Clones - SMB2 (Request) High
    2020/10/14DDI RULE 4466/vinfo/kr/threat-encyclopedia/network/ddi-rule-4466
    DDI RULE 4465 Remote System Discovery - LSARPC (REQUEST) Medium
    2020/10/08DDI RULE 4465/vinfo/kr/threat-encyclopedia/network/ddi-rule-4465
    DDI RULE 4455 CVE-2020-1472 - Zerologon Privilege Escalation - SMB2 (Request) Medium
    2020/10/08DDI RULE 4455/vinfo/kr/threat-encyclopedia/network/ddi-rule-4455
    DDI RULE 4459 CVE-2020-1472 - Zerologon Privilege Escalation - SMB (Request) High
    2020/10/08DDI RULE 4459/vinfo/kr/threat-encyclopedia/network/ddi-rule-4459
    DDI RULE 4463 QAKBOT - Malicious Certificate - SSL - Variant 3 High
    2020/10/08DDI RULE 4463/vinfo/kr/threat-encyclopedia/network/ddi-rule-4463
    DDI RULE 4300 WMI Command Execution - DCERPC (Request) Low
    2020/10/08DDI RULE 4300/vinfo/kr/threat-encyclopedia/network/ddi-rule-4300
    DDI RULE 1022 WMI Remote Registry - DCERPC (Request) Low
    2020/10/08DDI RULE 1022/vinfo/kr/threat-encyclopedia/network/ddi-rule-1022
    DDI RULE 2849 CVE-2019-9194-HTTP RCE - ELFINDER (Request) High
    2020/10/07DDI RULE 2849/vinfo/kr/threat-encyclopedia/network/ddi-rule-2849
    DDI RULE 4464 Remote System Discovery - LDAP (REQUEST) Medium
    2020/10/07DDI RULE 4464/vinfo/kr/threat-encyclopedia/network/ddi-rule-4464
    DDI RULE 4460 CVE-2017-17485 - Jackson Databind Remote Code Execution Exploit - HTTP (Request) High
    2020/10/05DDI RULE 4460/vinfo/kr/threat-encyclopedia/network/ddi-rule-4460
    DDI RULE 4461 CVE-2017-7504 - JBossMQ JMS Invocation Layer Exploit - HTTP (Request) High
    2020/10/05DDI RULE 4461/vinfo/kr/threat-encyclopedia/network/ddi-rule-4461
    DDI RULE 2212 Possible Brute force - RDP Low
    2020/10/05DDI RULE 2212/vinfo/kr/threat-encyclopedia/network/ddi-rule-2212
    DDI RULE 2388 Unsuccessful logon - RDP Low
    2020/10/05DDI RULE 2388/vinfo/kr/threat-encyclopedia/network/ddi-rule-2388
    DDI RULE 4142 SSL Connection Low
    2020/09/29DDI RULE 4142/vinfo/kr/threat-encyclopedia/network/ddi-rule-4142
    DDI RULE 4143 Malicious SSL Client Connection High
    2020/09/29DDI RULE 4143/vinfo/kr/threat-encyclopedia/network/ddi-rule-4143
    DDI RULE 4144 Malicious SSL Server Connection High
    2020/09/29DDI RULE 4144/vinfo/kr/threat-encyclopedia/network/ddi-rule-4144
    DDI RULE 4145 Malicious SSL Connection High
    2020/09/29DDI RULE 4145/vinfo/kr/threat-encyclopedia/network/ddi-rule-4145
    DDI RULE 4146 Suspicious SSL Connection Medium
    2020/09/29DDI RULE 4146/vinfo/kr/threat-encyclopedia/network/ddi-rule-4146
    DDI RULE 4147 Suspicious SSL Client Connection Low
    2020/09/29DDI RULE 4147/vinfo/kr/threat-encyclopedia/network/ddi-rule-4147
    DDI RULE 4148 Suspicious SSL Server Connection Low
    2020/09/29DDI RULE 4148/vinfo/kr/threat-encyclopedia/network/ddi-rule-4148
    DDI RULE 2210 Metasploit (Payload) - Reverse TCP Patchup Meterpreter High
    2020/09/28DDI RULE 2210/vinfo/kr/threat-encyclopedia/network/ddi-rule-2210
    DDI RULE 2751 Remote Command Shell - TCP High
    2020/09/24DDI RULE 2751/vinfo/kr/threat-encyclopedia/network/ddi-rule-2751
    DDI RULE 2752 Remote PowerShell - TCP High
    2020/09/24DDI RULE 2752/vinfo/kr/threat-encyclopedia/network/ddi-rule-2752
    DDI RULE 2664 CreateService - SMB (Request) High
    2020/09/21DDI RULE 2664/vinfo/kr/threat-encyclopedia/network/ddi-rule-2664
    DDI RULE 4443 Logon successful - SSH High
    2020/09/21DDI RULE 4443/vinfo/kr/threat-encyclopedia/network/ddi-rule-4443
    DDI RULE 4444 Unsuccessful logon - SSH High
    2020/09/21DDI RULE 4444/vinfo/kr/threat-encyclopedia/network/ddi-rule-4444
    DDI RULE 4445 Possible Brute force - SSH High
    2020/09/21DDI RULE 4445/vinfo/kr/threat-encyclopedia/network/ddi-rule-4445
    DDI RULE 4450 SERVER PROTECT RCE EXPLOIT - HTTP (REQUEST) High
    2020/09/17DDI RULE 4450/vinfo/kr/threat-encyclopedia/network/ddi-rule-4450
    DDI RULE 4451 APT - MUDDYWATER - HTTP (Request) High
    2020/09/17DDI RULE 4451/vinfo/kr/threat-encyclopedia/network/ddi-rule-4451
    DDI RULE 4452 CVE-2020-0911 - EXPLOIT - ICMPv6 (REQUEST) High
    2020/09/16DDI RULE 4452/vinfo/kr/threat-encyclopedia/network/ddi-rule-4452
    DDI RULE 4429 Remote Service execution through SMB2 SVCCTL detected - Variant 2 High
    2020/09/15DDI RULE 4429/vinfo/kr/threat-encyclopedia/network/ddi-rule-4429
    DDI RULE 4449 Remote Service execution through SMB2 SVCCTL detected - Variant 3 High
    2020/09/14DDI RULE 4449/vinfo/kr/threat-encyclopedia/network/ddi-rule-4449
    DDI RULE 4448 WORDPRESS PLUGIN FILEMANAGER EXPLOIT - HTTP (REQUEST) High
    2020/09/08DDI RULE 4448/vinfo/kr/threat-encyclopedia/network/ddi-rule-4448
    DDI RULE 4442 APT - DROVORUB - WEBSOCKET (RESPONSE) High
    2020/09/07DDI RULE 4442/vinfo/kr/threat-encyclopedia/network/ddi-rule-4442
    DDI RULE 4446 Apache Struts Potential Remote Code Execution Exploit - HTTP (Request) Medium
    2020/09/01DDI RULE 4446/vinfo/kr/threat-encyclopedia/network/ddi-rule-4446
    DDI RULE 4437 CVE-2014-9295 - Buffer Overflow - NTP (Request) High
    2020/08/24DDI RULE 4437/vinfo/kr/threat-encyclopedia/network/ddi-rule-4437
    DDI RULE 4438 CVE-2015-7855 - Denial of Service via decodenetnum - NTP (Request) High
    2020/08/24DDI RULE 4438/vinfo/kr/threat-encyclopedia/network/ddi-rule-4438
    DDI RULE 4439 CVE-2016-7434 - Denial of Service via mrulist - NTP (Request) High
    2020/08/24DDI RULE 4439/vinfo/kr/threat-encyclopedia/network/ddi-rule-4439
    DDI RULE 4440 CVE-2016-9312 - Possible Denial of Service via large packets - NTP (Request) Low
    2020/08/24DDI RULE 4440/vinfo/kr/threat-encyclopedia/network/ddi-rule-4440
    DDI RULE 4436 SQL Injection Remote Code Execution Sensor - HTTP (Request) Low
    2020/08/24DDI RULE 4436/vinfo/kr/threat-encyclopedia/network/ddi-rule-4436
    DDI RULE 4441 QAKBOT - Malicious Certificate - SSL - Variant 2 High
    2020/08/20DDI RULE 4441/vinfo/kr/threat-encyclopedia/network/ddi-rule-4441
    DDI RULE 4434 CVE-2020-9484 - Apache Tomcat Deserialization Remote Code Execution - HTTP (Request) High
    2020/08/10DDI RULE 4434/vinfo/kr/threat-encyclopedia/network/ddi-rule-4434
    DDI RULE 1599 Illegal Packet Size - Possible DOS Attack MODBUS Request High
    2020/08/06DDI RULE 1599/vinfo/kr/threat-encyclopedia/network/ddi-rule-1599
    DDI RULE 1598 Non-Modbus Communication Request High
    2020/08/06DDI RULE 1598/vinfo/kr/threat-encyclopedia/network/ddi-rule-1598
    DDI RULE 1600 Report Server ID MODBUS Request High
    2020/08/06DDI RULE 1600/vinfo/kr/threat-encyclopedia/network/ddi-rule-1600
    DDI RULE 1122 Office Document File Internal Transfer Low
    2020/08/05DDI RULE 1122/vinfo/kr/threat-encyclopedia/network/ddi-rule-1122
    DDI RULE 1123 Office Document File Upload Low
    2020/08/05DDI RULE 1123/vinfo/kr/threat-encyclopedia/network/ddi-rule-1123
    DDI RULE 1126 Executable file via FTP - class 1 Low
    2020/08/05DDI RULE 1126/vinfo/kr/threat-encyclopedia/network/ddi-rule-1126
    DDI RULE 1119 HTTP Request - Hostname is an IP address Low
    2020/08/05DDI RULE 1119/vinfo/kr/threat-encyclopedia/network/ddi-rule-1119
    DDI RULE 2289 Unsuccessful logon - FTP Low
    2020/08/05DDI RULE 2289/vinfo/kr/threat-encyclopedia/network/ddi-rule-2289
    DDI RULE 2290 Possible Brute force - FTP Low
    2020/08/05DDI RULE 2290/vinfo/kr/threat-encyclopedia/network/ddi-rule-2290
    DDI RULE 4430 Unencrypted REMCOS - TCP (Request) High
    2020/07/30DDI RULE 4430/vinfo/kr/threat-encyclopedia/network/ddi-rule-4430
    DDI RULE 4432 NGIOWEB - HTTP (REQUEST) High
    2020/07/30DDI RULE 4432/vinfo/kr/threat-encyclopedia/network/ddi-rule-4432
    DDI RULE 4433 APT - SUNFOU - HTTP (REQUEST) High
    2020/07/30DDI RULE 4433/vinfo/kr/threat-encyclopedia/network/ddi-rule-4433
    DDI RULE 2793 APT - WINNTI - HTTP (Response) High
    2020/07/30DDI RULE 2793/vinfo/kr/threat-encyclopedia/network/ddi-rule-2793
    DDI RULE 2874 ZEROSHELL RCE EXPLOIT - HTTP (Request) High
    2020/07/30DDI RULE 2874/vinfo/kr/threat-encyclopedia/network/ddi-rule-2874
    DDI RULE 1764 Possible Superfish SSL certificate detected Low
    2020/07/29DDI RULE 1764/vinfo/kr/threat-encyclopedia/network/ddi-rule-1764
    DDI RULE 2890 INFOSTEAL - HTTP (Request) - Variant 5 High
    2020/07/28DDI RULE 2890/vinfo/kr/threat-encyclopedia/network/ddi-rule-2890
    DDI RULE 1052 IP Malicious - Class 1 Low
    2020/07/27DDI RULE 1052/vinfo/kr/threat-encyclopedia/network/ddi-rule-1052
    DDI RULE 4427 APT - WELLMAIL - Malicious Certificate - SSL (Response) High
    2020/07/23DDI RULE 4427/vinfo/kr/threat-encyclopedia/network/ddi-rule-4427
    DDI RULE 4428 APT - WELLMESS - Malicious Certificate - SSL (Response) High
    2020/07/23DDI RULE 4428/vinfo/kr/threat-encyclopedia/network/ddi-rule-4428
    DDI RULE 4425 CVE-2020-1350 - DNS OVER TCP EXPLOIT - DNS (Response) High
    2020/07/22DDI RULE 4425/vinfo/kr/threat-encyclopedia/network/ddi-rule-4425
    DDI RULE 4426 CVE-2020-1350 - DNS OVER TCP EXPLOIT - TCP (Request) High
    2020/07/22DDI RULE 4426/vinfo/kr/threat-encyclopedia/network/ddi-rule-4426
    DDI RULE 2000 Metasploit(Payload) - Reverse DLL Inject - TCP (Response) High
    2020/07/22DDI RULE 2000/vinfo/kr/threat-encyclopedia/network/ddi-rule-2000
    DDI RULE 2211 Unsuccessful logon using default Administrator account - RDP Low
    2020/07/20DDI RULE 2211/vinfo/kr/threat-encyclopedia/network/ddi-rule-2211
    DDI RULE 2213 Possible Brute force using privileged user - RDP Low
    2020/07/20DDI RULE 2213/vinfo/kr/threat-encyclopedia/network/ddi-rule-2213
    DDI RULE 2391 Busybox Checking - TELNET (Request) High
    2020/07/13DDI RULE 2391/vinfo/kr/threat-encyclopedia/network/ddi-rule-2391
    DDI RULE 4424 CVE-2020-5902 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2020/07/09DDI RULE 4424/vinfo/kr/threat-encyclopedia/network/ddi-rule-4424
    DDI RULE 4322 possible Directory Traversal Exploit Attempted - URI Path - HTTP (Request) - Variant 2 High
    2020/07/09DDI RULE 4322/vinfo/kr/threat-encyclopedia/network/ddi-rule-4322
    DDI RULE 4321 POWERTRICK - HTTP (REQUEST) High
    2020/07/06DDI RULE 4321/vinfo/kr/threat-encyclopedia/network/ddi-rule-4321
    DDI RULE 4207 CVE-2019-11354 - DOTPROJECT SQL Injection - HTTP (Request) High
    2020/07/01DDI RULE 4207/vinfo/kr/threat-encyclopedia/network/ddi-rule-4207
    DDI RULE 4230 APT - DATPER - HTTP (Request) High
    2020/06/23DDI RULE 4230/vinfo/kr/threat-encyclopedia/network/ddi-rule-4230
    DDI RULE 4309 APT - LODEINFO - HTTP (Request) High
    2020/06/23DDI RULE 4309/vinfo/kr/threat-encyclopedia/network/ddi-rule-4309
    DDI RULE 4311 APT - BOTLODR - HTTP (REQUEST) High
    2020/06/23DDI RULE 4311/vinfo/kr/threat-encyclopedia/network/ddi-rule-4311
    DDI RULE 4313 MALXMR - HTTP (REQUEST) High
    2020/06/23DDI RULE 4313/vinfo/kr/threat-encyclopedia/network/ddi-rule-4313
    DDI RULE 4305 APT - KSDOOR - HTTP (REQUEST) High
    2020/06/23DDI RULE 4305/vinfo/kr/threat-encyclopedia/network/ddi-rule-4305
    DDI RULE 2663 APT - EXFRAM - TCP (Request) High
    2020/06/23DDI RULE 2663/vinfo/kr/threat-encyclopedia/network/ddi-rule-2663
    DDI RULE 1704 APT - TALERET - HTTP (Request) - Variant 2 High
    2020/06/23DDI RULE 1704/vinfo/kr/threat-encyclopedia/network/ddi-rule-1704
    DDI RULE 2019 APT - DALGAN - HTTP (Request) High
    2020/06/23DDI RULE 2019/vinfo/kr/threat-encyclopedia/network/ddi-rule-2019
    DDI RULE 1549 APT - WINNTI - HTTP (Request) High
    2020/06/23DDI RULE 1549/vinfo/kr/threat-encyclopedia/network/ddi-rule-1549
    DDI RULE 1046 APT - Connection attempt to an APT-related CNC server detected High
    2020/06/23DDI RULE 1046/vinfo/kr/threat-encyclopedia/network/ddi-rule-1046
    DDI RULE 1774 APT - Possible EMDIVI - HTTP (Request) - Variant 5 Low
    2020/06/23DDI RULE 1774/vinfo/kr/threat-encyclopedia/network/ddi-rule-1774
    DDI RULE 1139 DORKBOT IRC Request - Class 1 High
    2020/06/22DDI RULE 1139/vinfo/kr/threat-encyclopedia/network/ddi-rule-1139
    DDI RULE 2585 Ratankba Downloader - HTTP (Response) High
    2020/06/17DDI RULE 2585/vinfo/kr/threat-encyclopedia/network/ddi-rule-2585
    DDI RULE 2653 PHOTOMINER - HTTP (Response) High
    2020/06/17DDI RULE 2653/vinfo/kr/threat-encyclopedia/network/ddi-rule-2653
    DDI RULE 2591 KRBANKER - HTTP (Response) High
    2020/06/17DDI RULE 2591/vinfo/kr/threat-encyclopedia/network/ddi-rule-2591
    DDI RULE 2620 Suspicious Executable File Download - HTTP (Response) High
    2020/06/17DDI RULE 2620/vinfo/kr/threat-encyclopedia/network/ddi-rule-2620
    DDI RULE 2608 EMOTET - HTTP (Response) - Variant 2 High
    2020/06/17DDI RULE 2608/vinfo/kr/threat-encyclopedia/network/ddi-rule-2608
    DDI RULE 2609 HANCITOR - HTTP (Request) - Variant 3 High
    2020/06/17DDI RULE 2609/vinfo/kr/threat-encyclopedia/network/ddi-rule-2609
    DDI RULE 2616 Suspicious CWS Flash - HTTP (Response) Medium
    2020/06/17DDI RULE 2616/vinfo/kr/threat-encyclopedia/network/ddi-rule-2616
    DDI RULE 2617 GANDCRAB - Ransomware - HTTP (Response) High
    2020/06/17DDI RULE 2617/vinfo/kr/threat-encyclopedia/network/ddi-rule-2617
    DDI RULE 2650 ANDROM - HTTP (Response) Medium
    2020/06/17DDI RULE 2650/vinfo/kr/threat-encyclopedia/network/ddi-rule-2650
    DDI RULE 2757 ELF File requested from root directory - HTTP (Response) High
    2020/06/17DDI RULE 2757/vinfo/kr/threat-encyclopedia/network/ddi-rule-2757
    DDI RULE 2767 Window Shell Remote Code Execution - HTTP (Response) High
    2020/06/17DDI RULE 2767/vinfo/kr/threat-encyclopedia/network/ddi-rule-2767
    DDI RULE 2731 KAIXIN - Exploit Kit - HTTP (Response) - Variant 5 High
    2020/06/17DDI RULE 2731/vinfo/kr/threat-encyclopedia/network/ddi-rule-2731
    DDI RULE 4303 Executable file download from root directory - HTTP (Response) Low
    2020/06/17DDI RULE 4303/vinfo/kr/threat-encyclopedia/network/ddi-rule-4303
    DDI RULE 4304 Executable file download - HTTP (Response) Low
    2020/06/17DDI RULE 4304/vinfo/kr/threat-encyclopedia/network/ddi-rule-4304
    DDI RULE 4323 CVE-2019-19781 - CITRIX ADC DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2020/06/17DDI RULE 4323/vinfo/kr/threat-encyclopedia/network/ddi-rule-4323
    DDI RULE 4355 CVE-2020-8794 - OPENSMTPD RCE EXPLOIT - SMTP (RESPONSE) High
    2020/06/17DDI RULE 4355/vinfo/kr/threat-encyclopedia/network/ddi-rule-4355
    DDI RULE 4181 TREVOR - HTTP (Response) Medium
    2020/06/17DDI RULE 4181/vinfo/kr/threat-encyclopedia/network/ddi-rule-4181
    DDI RULE 4398 CVE-2020-12109 - TPLINK RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/17DDI RULE 4398/vinfo/kr/threat-encyclopedia/network/ddi-rule-4398
    DDI RULE 4423 ACIDBAT - TCP (Request) Medium
    2020/06/17DDI RULE 4423/vinfo/kr/threat-encyclopedia/network/ddi-rule-4423
    DDI RULE 4380 CVE-2020-5722 - GRANDSTREAM RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/17DDI RULE 4380/vinfo/kr/threat-encyclopedia/network/ddi-rule-4380
    DDI RULE 2825 CVE-2010-1871 JBOSS Remote Code Execution - HTTP (Request) High
    2020/06/17DDI RULE 2825/vinfo/kr/threat-encyclopedia/network/ddi-rule-2825
    DDI RULE 2715 MINER CONFIG - HTTP (Response) High
    2020/06/17DDI RULE 2715/vinfo/kr/threat-encyclopedia/network/ddi-rule-2715
    DDI RULE 2481 DOWNLOADER - HTTP (Response) High
    2020/06/17DDI RULE 2481/vinfo/kr/threat-encyclopedia/network/ddi-rule-2481
    DDI RULE 2467 RETEFE - HTTP (Response) High
    2020/06/17DDI RULE 2467/vinfo/kr/threat-encyclopedia/network/ddi-rule-2467
    DDI RULE 2542 MINER - HTTP (Response) High
    2020/06/17DDI RULE 2542/vinfo/kr/threat-encyclopedia/network/ddi-rule-2542
    DDI RULE 2504 CVE-2017-9798 - APACHE OPTIONSBLEED Vulnerability - HTTP (Response) High
    2020/06/17DDI RULE 2504/vinfo/kr/threat-encyclopedia/network/ddi-rule-2504
    DDI RULE 2514 TERROR - Exploit Kit - HTTP (Response) High
    2020/06/17DDI RULE 2514/vinfo/kr/threat-encyclopedia/network/ddi-rule-2514
    DDI RULE 2443 SPORA - Ransomware - HTTP (Response) High
    2020/06/17DDI RULE 2443/vinfo/kr/threat-encyclopedia/network/ddi-rule-2443
    DDI RULE 2517 CVE-2017-14493 - DNSMASQ Buffer Overflow Exploit - DHCP (Request) High
    2020/06/16DDI RULE 2517/vinfo/kr/threat-encyclopedia/network/ddi-rule-2517
    DDI RULE 2518 CVE-2017-14496 - DNSMASQ Integer Underflow Exploit - DNS (Request) High
    2020/06/16DDI RULE 2518/vinfo/kr/threat-encyclopedia/network/ddi-rule-2518
    DDI RULE 2588 CVE-2017-9822 DotNetNuke Remote Code Execution Exploit - HTTP (Request) High
    2020/06/16DDI RULE 2588/vinfo/kr/threat-encyclopedia/network/ddi-rule-2588
    DDI RULE 2253 CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request) High
    2020/06/16DDI RULE 2253/vinfo/kr/threat-encyclopedia/network/ddi-rule-2253
    DDI RULE 4401 CVE-2020-13118 - MIKROTIK SQL INJECT - HTTP (REQUEST) High
    2020/06/16DDI RULE 4401/vinfo/kr/threat-encyclopedia/network/ddi-rule-4401
    DDI RULE 4383 CVE-2020-7961 - LIFERAY PORTAL RCE EXPLOIT - HTTP (Request) High
    2020/06/16DDI RULE 4383/vinfo/kr/threat-encyclopedia/network/ddi-rule-4383
    DDI RULE 4391 COBEACON - DNS (Response) High
    2020/06/16DDI RULE 4391/vinfo/kr/threat-encyclopedia/network/ddi-rule-4391
    DDI RULE 4325 CVE-2019-10758 - MONGODB RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/16DDI RULE 4325/vinfo/kr/threat-encyclopedia/network/ddi-rule-4325
    DDI RULE 4267 CVE-2019-11043 - PHP RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/16DDI RULE 4267/vinfo/kr/threat-encyclopedia/network/ddi-rule-4267
    DDI RULE 4277 CVE-2019-5127 - YOUPHPTUBE COMMAND INJECTION - HTTP (REQUEST) High
    2020/06/16DDI RULE 4277/vinfo/kr/threat-encyclopedia/network/ddi-rule-4277
    DDI RULE 4324 CVE-2019-20197 - NAGIOSXI Remote Code Execution Exploit - HTTP (Request) High
    2020/06/16DDI RULE 4324/vinfo/kr/threat-encyclopedia/network/ddi-rule-4324
    DDI RULE 4248 CVE-2019-2618 - WEBLOGIC FILE UPLOAD EXPLOIT - HTTP (REQUEST) Medium
    2020/06/16DDI RULE 4248/vinfo/kr/threat-encyclopedia/network/ddi-rule-4248
    DDI RULE 4113 CVE-2019-12095 Horde Webmail Unauthenticated XSS Exploit - HTTP (Request) High
    2020/06/16DDI RULE 4113/vinfo/kr/threat-encyclopedia/network/ddi-rule-4113
    DDI RULE 4111 CVE-2009-5157 Linksys WAG54G2 RCE Exploit - HTTP (Request) High
    2020/06/16DDI RULE 4111/vinfo/kr/threat-encyclopedia/network/ddi-rule-4111
    DDI RULE 4114 CVE-2012-4869 PBX RCE Exploit - HTTP (Request) High
    2020/06/16DDI RULE 4114/vinfo/kr/threat-encyclopedia/network/ddi-rule-4114
    DDI RULE 4217 CVE-2019-12991 - CITRIX SDWAN RCE - HTTP (Request) High
    2020/06/16DDI RULE 4217/vinfo/kr/threat-encyclopedia/network/ddi-rule-4217
    DDI RULE 4242 CVE-2018-18778 - ACME File Discovery Exploit - HTTP (RESPONSE) Medium
    2020/06/16DDI RULE 4242/vinfo/kr/threat-encyclopedia/network/ddi-rule-4242
    DDI RULE 4204 CVE-2019-15107 WEBMIN RCE Exploit - HTTP (Request) High
    2020/06/16DDI RULE 4204/vinfo/kr/threat-encyclopedia/network/ddi-rule-4204
    DDI RULE 1531 Possible SSL CVE-2014-0224 CCS Injection - Class 1 Medium
    2020/06/16DDI RULE 1531/vinfo/kr/threat-encyclopedia/network/ddi-rule-1531
    DDI RULE 2939 CVE-2018-6961 VMWARE NSX RCE EXPLOIT - HTTP (Request) High
    2020/06/16DDI RULE 2939/vinfo/kr/threat-encyclopedia/network/ddi-rule-2939
    DDI RULE 4218 CVE-2014-4663 TIMTHUMB RCE Exploit- HTTP (Request) High
    2020/06/15DDI RULE 4218/vinfo/kr/threat-encyclopedia/network/ddi-rule-4218
    DDI RULE 4188 CVE-2014-3914 - Rocket Servergraph - RCE - HTTP (Request) High
    2020/06/15DDI RULE 4188/vinfo/kr/threat-encyclopedia/network/ddi-rule-4188
    DDI RULE 4112 CVE-2019-12094 Horde Webmail Unauthenticated RCE Exploit - HTTP (Request) High
    2020/06/15DDI RULE 4112/vinfo/kr/threat-encyclopedia/network/ddi-rule-4112
    DDI RULE 2723 MAGNITUDE - Exploit Kit - HTTP (Response) High
    2020/06/15DDI RULE 2723/vinfo/kr/threat-encyclopedia/network/ddi-rule-2723
    DDI RULE 2701 Possible EMOTET - HTTP (Response) - Variant 3 High
    2020/06/15DDI RULE 2701/vinfo/kr/threat-encyclopedia/network/ddi-rule-2701
    DDI RULE 2750 CVE-2018-8007 Apache CouchDB Remote Code Execution Exploit - HTTP (Request) High
    2020/06/15DDI RULE 2750/vinfo/kr/threat-encyclopedia/network/ddi-rule-2750
    DDI RULE 4333 CVE-2019-18396 - TECHNICOLOR RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4333/vinfo/kr/threat-encyclopedia/network/ddi-rule-4333
    DDI RULE 4339 CVE-2018-7777 - SCHNEIDER RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4339/vinfo/kr/threat-encyclopedia/network/ddi-rule-4339
    DDI RULE 4278 CVE-2019-5121 - YOUPHPTUBE SQL INJECTION - HTTP (REQUEST) High
    2020/06/15DDI RULE 4278/vinfo/kr/threat-encyclopedia/network/ddi-rule-4278
    DDI RULE 4274 CVE-2007-5693 - Sitebar Remote Code Execution EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4274/vinfo/kr/threat-encyclopedia/network/ddi-rule-4274
    DDI RULE 4273 CVE-2019-16278 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4273/vinfo/kr/threat-encyclopedia/network/ddi-rule-4273
    DDI RULE 4251 CVE-2019-16920 - DLINK RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4251/vinfo/kr/threat-encyclopedia/network/ddi-rule-4251
    DDI RULE 4421 CVE-2020-1301 - RCE DDOS EXPLOIT - SMB (Request) Medium
    2020/06/15DDI RULE 4421/vinfo/kr/threat-encyclopedia/network/ddi-rule-4421
    DDI RULE 4422 Possible CVE-2020-1206 - BLEED EXPLOIT - (Request) Medium
    2020/06/15DDI RULE 4422/vinfo/kr/threat-encyclopedia/network/ddi-rule-4422
    DDI RULE 4372 CVE-2020-8949 - GOCLOUD RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4372/vinfo/kr/threat-encyclopedia/network/ddi-rule-4372
    DDI RULE 4373 CVE-2020-9026 - ELTEX RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4373/vinfo/kr/threat-encyclopedia/network/ddi-rule-4373
    DDI RULE 4379 CVE-2019-20499 - DLINK DWL RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4379/vinfo/kr/threat-encyclopedia/network/ddi-rule-4379
    DDI RULE 4400 CVE-2019-7193 - QNAP RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/15DDI RULE 4400/vinfo/kr/threat-encyclopedia/network/ddi-rule-4400
    DDI RULE 1010 PE_XPAJ TCP Connection - Class 1 High
    2020/06/15DDI RULE 1010/vinfo/kr/threat-encyclopedia/network/ddi-rule-1010
    DDI RULE 2589 LOKI - HTTP (Response) High
    2020/06/15DDI RULE 2589/vinfo/kr/threat-encyclopedia/network/ddi-rule-2589
    DDI RULE 2377 CVE-2017-9073 - Remote Code Execution - RDP High
    2020/06/15DDI RULE 2377/vinfo/kr/threat-encyclopedia/network/ddi-rule-2377
    DDI RULE 2448 REGEORG - HTTP (Response) High
    2020/06/15DDI RULE 2448/vinfo/kr/threat-encyclopedia/network/ddi-rule-2448
    DDI RULE 4259 MDMP File Upload Low
    2020/06/12DDI RULE 4259/vinfo/kr/threat-encyclopedia/network/ddi-rule-4259
    DDI RULE 4260 Log Files Upload Low
    2020/06/12DDI RULE 4260/vinfo/kr/threat-encyclopedia/network/ddi-rule-4260
    DDI RULE 4403 SSH on Non-Standard Port - Request Medium
    2020/06/11DDI RULE 4403/vinfo/kr/threat-encyclopedia/network/ddi-rule-4403
    DDI RULE 4415 JSPSPY Webshell - HTTP (Request) - Variant 2 High
    2020/06/08DDI RULE 4415/vinfo/kr/threat-encyclopedia/network/ddi-rule-4415
    DDI RULE 4419 Zyxel - Remote Code Execution - HTTP (Request) - Variant 2 High
    2020/06/08DDI RULE 4419/vinfo/kr/threat-encyclopedia/network/ddi-rule-4419
    DDI RULE 4420 SHELLRESET - DATA EXFILTRATION - HTTP (Request) High
    2020/06/08DDI RULE 4420/vinfo/kr/threat-encyclopedia/network/ddi-rule-4420
    DDI RULE 2639 CVE-2018-10562 - GPON Remote Code Execution - HTTP (Request) High
    2020/06/08DDI RULE 2639/vinfo/kr/threat-encyclopedia/network/ddi-rule-2639
    DDI RULE 4418 Possible CVE-2020-0796 - SERVER COMPRESSION TRANSFORM EXPLOIT - SMB3 (Request) - Variant 2 Medium
    2020/06/05DDI RULE 4418/vinfo/kr/threat-encyclopedia/network/ddi-rule-4418
    DDI RULE 4416 CVE-2020-11963 - IQROUTER RCE EXPLOIT - HTTP (REQUEST) High
    2020/06/04DDI RULE 4416/vinfo/kr/threat-encyclopedia/network/ddi-rule-4416
    DDI RULE 4417 CVE-2020-11963 - IQROUTER RCE EXPLOIT - HTTP (REQUEST) - Variant 2 High
    2020/06/04DDI RULE 4417/vinfo/kr/threat-encyclopedia/network/ddi-rule-4417
    DDI RULE 4414 ThinkPHP 5x Remote Code Execution - HTTP (Request) - Variant 2 High
    2020/06/03DDI RULE 4414/vinfo/kr/threat-encyclopedia/network/ddi-rule-4414
    DDI RULE 4402 CVE-2020-11652 - Saltstack Directory Traversal - TCP (Request) High
    2020/06/03DDI RULE 4402/vinfo/kr/threat-encyclopedia/network/ddi-rule-4402
    DDI RULE 4399 CVE-2020-11651 - Saltstack Remote Code Execution Exploit - TCP (Request) High
    2020/06/03DDI RULE 4399/vinfo/kr/threat-encyclopedia/network/ddi-rule-4399
    DDI RULE 2500 Executable Image Download - HTTP (Response) Medium
    2020/06/03DDI RULE 2500/vinfo/kr/threat-encyclopedia/network/ddi-rule-2500
    DDI RULE 4413 Possible Directory Traversal Exploit Attempted SENSOR - HEADERS - HTTP (Request) Low
    2020/06/02DDI RULE 4413/vinfo/kr/threat-encyclopedia/network/ddi-rule-4413
    DDI RULE 4412 CVE-2020-8617 - NXNSATTACK - DNS (REQUEST) High
    2020/06/01DDI RULE 4412/vinfo/kr/threat-encyclopedia/network/ddi-rule-4412
    DDI RULE 4397 ACTIVE DIRECTORY GPO DEPLOY COMMAND - SMB2 (Response) High
    2020/05/28DDI RULE 4397/vinfo/kr/threat-encyclopedia/network/ddi-rule-4397
    DDI RULE 2837 CVE-2012-0874 JBOSS JMXInvoker/EJBinvoker Remote Code Execution Exploit - HTTP (Request) Medium
    2020/05/26DDI RULE 2837/vinfo/kr/threat-encyclopedia/network/ddi-rule-2837
    DDI RULE 4235 Remote CreateService - SMB2 (Request) High
    2020/05/14DDI RULE 4235/vinfo/kr/threat-encyclopedia/network/ddi-rule-4235
    DDI RULE 4236 Meterpreter Powershell - SMB2 (Request) High
    2020/05/14DDI RULE 4236/vinfo/kr/threat-encyclopedia/network/ddi-rule-4236
    DDI RULE 2654 Powershell - SMB Medium
    2020/05/14DDI RULE 2654/vinfo/kr/threat-encyclopedia/network/ddi-rule-2654
    DDI RULE 4389 APT - GRIFFON - HTTP (Request) High
    2020/05/13DDI RULE 4389/vinfo/kr/threat-encyclopedia/network/ddi-rule-4389
    DDI RULE 4395 HADGLIDER - HTTP (REQUEST) High
    2020/05/13DDI RULE 4395/vinfo/kr/threat-encyclopedia/network/ddi-rule-4395
    DDI RULE 4390 CobaltStrike - HTTPS (Request) Low
    2020/05/12DDI RULE 4390/vinfo/kr/threat-encyclopedia/network/ddi-rule-4390
    DDI RULE 4392 CVE-2020-12078 - OPENAUDIT RCE EXPLOIT - HTTP (Request) High
    2020/05/11DDI RULE 4392/vinfo/kr/threat-encyclopedia/network/ddi-rule-4392
    DDI RULE 4393 CVE-2020-10808 - IFS UNIX EXPLOIT - FTP (Request) High
    2020/05/11DDI RULE 4393/vinfo/kr/threat-encyclopedia/network/ddi-rule-4393
    DDI RULE 4394 CVE-2020-2883 - WEBLOGIC T3 EXPLOIT - TCP (REQUEST) High
    2020/05/11DDI RULE 4394/vinfo/kr/threat-encyclopedia/network/ddi-rule-4394
    DDI RULE 1641 CVE-2014-6277 - SHELLSHOCK HTTP Exploit High
    2020/05/11DDI RULE 1641/vinfo/kr/threat-encyclopedia/network/ddi-rule-1641
    DDI RULE 4387 Possible SoftEther VPN Client - HTTPS (REQUEST) Medium
    2020/05/06DDI RULE 4387/vinfo/kr/threat-encyclopedia/network/ddi-rule-4387
    DDI RULE 4386 CVE-2020-3952 - VSPHERE EXPLOIT - LDAP (Request) Low
    2020/05/05DDI RULE 4386/vinfo/kr/threat-encyclopedia/network/ddi-rule-4386
    DDI RULE 4385 Invalid Credentials - LDAP (Response) Low
    2020/05/04DDI RULE 4385/vinfo/kr/threat-encyclopedia/network/ddi-rule-4385
    DDI RULE 4384 UNIX IFS SHELL RCE - HTTP (Request) Low
    2020/04/29DDI RULE 4384/vinfo/kr/threat-encyclopedia/network/ddi-rule-4384
    DDI RULE 1502 Possible Malformed Heartbeat SSL Response - Class 1 Medium
    2020/04/29DDI RULE 1502/vinfo/kr/threat-encyclopedia/network/ddi-rule-1502
    DDI RULE 1503 Possible Malformed Heartbeat SSL Response - Class 2 Medium
    2020/04/29DDI RULE 1503/vinfo/kr/threat-encyclopedia/network/ddi-rule-1503
    DDI RULE 2005 Possible EDELLROOT certificate detected High
    2020/04/28DDI RULE 2005/vinfo/kr/threat-encyclopedia/network/ddi-rule-2005
    DDI RULE 2412 TRICKBOT - Malicious certificate - SSL High
    2020/04/28DDI RULE 2412/vinfo/kr/threat-encyclopedia/network/ddi-rule-2412
    DDI RULE 2363 QAKBOT - Malicious certificate - SSL High
    2020/04/28DDI RULE 2363/vinfo/kr/threat-encyclopedia/network/ddi-rule-2363

    30일간 트렌드마이크로 서비스 무료로 사용해 보기

    • 무료 평가판 지금 시작

    리소스

    • 블로그
    • 뉴스룸
    • 위협 보고서
    • DevOps 리소스 센터
    • CISO 리소스 센터
    • 파트너 찾기

    지원

    • Business Support Portal
    • 문의
    • 다운로드
    • 무료 평가판

    트렌드마이크로 정보

    • 당사 소개
    • 인재 채용
    • 위치
    • 이벤트 안내
    • Trust Center

    국가 / 지역 선택

    ✕

    아메리카

    • 미국
    • 브라질
    • 캐나다
    • 멕시코

    중동 & 아프리카

    • 남아프리카공화국
    • 중동 및 북아프리카

    유럽

    • 벨기에
    • 체코
    • 덴마크
    • 독일, 스위스
    • 스페인
    • 프랑스
    • 아일랜드
    • 이탈리아
    • 네덜란드
    • 노르웨이
    • 폴란드
    • 핀란드
    • 스웨덴
    • 터키
    • 영국

    아시아 & 태평양

    • 호주
    • 중앙 아시아
    • 홍콩(영어)
    • 홍콩
    • 인도
    • 인도네시아
    • 일본
    • 대한민국
    • 말레이시아
    • 몽골, 조지아
    • 뉴질랜드
    • 필리핀
    • 싱가포르
    • 대만
    • 태국
    • 베트남

    개인정보보호 | 법률 | 접근성 | 사이트 맵

    Copyright ©2023 Trend Micro Incorporated. All rights reserved.