'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2017-08-16 | |
| Rule Name: | Possible Successful Generic Phish (set) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. | |
| Impact: | Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Search and kill the malware by using antivirus tools and repair the system vulnerabilities. |