'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:717198)

Rule General Information
Release Date: 2025-11-12
Rule Name: BitCoin Protocol Detection
Severity:
CVE ID:
Rule Protection Details
Description: Bitcoin protocol traffic has been observed on the network. The protocol is designed for peer-to-peer exchange of blocks, transactions and address information; adversaries abuse its decentralized, encrypted and pseudonymous nature to smuggle malicious payloads, C2 directives or exfiltrated data inside otherwise legitimate messages, evading conventional inspection. They may also poison mempools, spoof handshake packets or launch eclipse attacks to disrupt consensus, enabling double-spending, hash-rate hijacking or chain splits that endanger digital assets and operational continuity.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.