Comment to 'UNA 13 Attack Problem'
  • The file which you mentioned is an image file, of course.

    False positives are common with firewalls, however, malicious code can be attached (hidden) in image files. In fact, even a tiny ico file can contain a virus. Who would have known?

    From the reversinglabs site:

    Image formats can be as dangerous as executables, and Titanium Platform is a reliable partner that can quickly detect such embedded threats. Even though in most cases images are used as a non-executable container for the malware, there are instances where images can trigger execution if placed in an unexpected, misconfigured place. For example, the described PHP web shells placed on a vulnerable server.
    This is why every piece of content entering a business network must be analyzed and checked for malicious content, regardless of the file format. Malware authors and threat actors will always look for blind spots where they can bypass defenses. Having detection gaps can lead to severe business operation interruption and cause brand damage.
    • Ok Banister that's interesting, I'll check the graphic file offline with Avast. And I will look into the Titanium Platform. If my sever still has a record of the event, I will look at the two IPs that attempted to access the file. Thank you!