This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects malicious serialized objects.
Object serialization can be used to convert objects to various binary and textual data formats for storage or transfer. If applications doesn't verify or validate these serialized object from untrusted source it can lead to execution of arbitrary code.