Intrusion Prevention



This indicates an attack attempt to exploit an internal network's boundary router using an internal client as a proxy.

Affected Products

DNSChanger Exploit Kit


Traffic Men-In-the-Middle Attack: Remote attackers can access and control network traffic.

Recommended Actions

Monitor the traffic from that network for any suspicious activity.
Update systems and applications to the latest version.