The Passive Vulnerability Scanner (PVS) has also been updated with plugin ID 5880, which will look for the malicious URL in transit across the network and fire an alert.
The Log Correlation Engine has been updated to include a TASL to look for queries that match the query being used in the LizaMoon attacks. For example, the SQL query used in the injection attacks has presented itself as:
Try Tenable.io free for 60 days. Protect your organization from WannaCry, NotPetya and other ransomware cyberattacks. Get Started
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.