This indicates detection of possible threats based on information obtained from CIG Circulars.
This covers CIG Circular:
System Compromise: Remote attackers can gain control of vulnerable systems.
If required, the signature's action can be set to "Block".
Please use Anti-Virus software to scan and clean the infected computer.