|Alert Message||Atomicorp.com WAF Rules: Known wormsign|
This rule detects "smoke screen" connections from Pushdo botnet clients. These connections are used by the botnet, on the remote client, to hide its connections by connecting to sites that are not part of the botnet.
These connections do not mean your system has been compromised by this botnet. The botnet generates "smoke screen" or cover traffic to hide from the remote client in the "noise" generated by all the bogus connections. The intent is to try to prevent the remote client from detecting the botnets connections.
These connections to your system, however, may present a Distributed Denial of Service risk if there are a large volume of compromised clients connecting to your system. To help alleviate this, this rule will "drop" the connection from the client and will not return an error. This is to reduce the load on the web server. If ASL is being used, ASL will shun the compromised clients with a firewall rule.
 False Positives
It is not recommended that you disable this rule if you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the Reporting False Positives wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.
 Tuning Guidance
None. It is not recommended that you disable this rule. However if you wish to, please see the Tuning the Atomicorp WAF Rules page for basic information.
 Additional Information
 Similar Rules
 Knowledge Base Articles
 Outside References