Below is an example of the plugin report:
Click for larger image
The Passive Vulnerability Scanner (PVS) has also been updated with plugin ID 5880, which will look for the malicious URL in transit across the network and fire an alert.
The Log Correlation Engine has been updated to include a TASL to look for queries that match the query being used in the LizaMoon attacks. For example, the SQL query used in the injection attacks has presented itself as:
The query used by LizaMoon is not unique to this particular malware so the TASL script will pick up similar SQL injection attacks.