""ET CURRENT_EVENTS Twitter Credential Phish Landing Page 2022-11-04""

SID: 2039717

Revision: 1

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_11_04, deployment Perimeter, signature_severity Major, updated_at 2022_11_04

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "200"

  • Value: "Twitter"</p> </li> <li> <p>Value: "Copyright Infringement Detected In Your Account"</p> </li> <li> <p>Value: "action=|3d 22|username.php|22|"</p> </li> <li> <p>Value: "As an Twitter Team"</p> </li> </ul> <p><strong>Within:</strong> </p> <p><strong>PCRE:</strong> </p> <p><strong>Special Options:</strong></p> <ul> <li> <p>http_stat_code</p> </li> <li> <p>file_data</p> </li> </ul> <p><a href="https://github.com/magicsword-io/Magic-SigExplorer/tree/main/yaml/et/et_rule_2039717.yaml"><em>source</em></a></p> </div> </div><footer> <hr/> <div role="contentinfo"> <!-- Copyright etc --> </div> Built with <a href="https://www.mkdocs.org/">MkDocs</a> using a <a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a> provided by <a href="https://readthedocs.org">Read the Docs</a>. </footer> </div> </div> </section> </div> <div class="rst-versions" role="note" aria-label="Versions"> <span class="rst-current-version" data-toggle="rst-current-version"> </span> </div> <script src="../../../js/jquery-3.6.0.min.js"></script> <script>var base_url = "../../..";</script> <script src="../../../js/theme_extra.js"></script> <script src="../../../js/theme.js"></script> <script src="../../../search/main.js"></script> <script> jQuery(function () { SphinxRtdTheme.Navigation.enable(true); }); </script> </body> </html>