Backdoor.Mythic
Description
This indicates detection of backdoor traffic using the Mythic Framework.
Backdoor trojans have the capability to connect to remote hosts and perform actions against the compromised system. Mythic is a post-exploitation command and control framework.
Affected Products
Any unprotected Windows, Linux or MacOS platform is vulnerable to the attack.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
This signature's action can be set to "Block" to block this application.
Please use Anti-Virus software to scan and clean the system.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |