Threat Indicator Database Threat Types

Threat Intelligence categorizes threats by different characteristics, including the methods used by the threat actor to compromise the target system's security, and the threat's symptoms.

Type Description
Adware Presents unwanted advertisements to users
Anomalous Is associated with unusual activity but might not be a threat
Atm_malware Uses automated teller machine (ATM) terminals to obtain bank card information and credentials
Backdoor Provides access to systems or data without normal authentication or encryption
Banking Targets financial institutions and banks
Botnets Uses a network of compromised, Internet-connected computers
Bruteforce Systematically tries many combinations of usernames and passwords
Clickfraud Simulates a user clicking an advertisement to generate revenue for the ad publisher
Commandcontrol Takes control of a computer that issues commands to other infected computers
Commandinjection Exploits a vulnerable application to run malicious commands on the host operating system
Commodity Uses readily available tools with little or no customization to perform security attacks
Credentialharvesting Identifies valid credentials for a system, often to sell or distribute to other actors
Criminal Uses tools that are typically sold and distributed by criminal organizations
Cryptocurrencytheft Infects blockchain or financial software to perform unauthorized transfers of cryptocurrency
Denialofservice Floods a target computer with requests so that it can't fulfill legitimate requests
DeploymentFramework Uses commercial or open source orchestration tools to deploy malware
Downloader Downloads and runs malware by pretending to be legitimate software
Dropper Installs a malicious program by pretending to be legitimate software
Emailattack Floods a target system with email messages, or sends emails containing malicious links or attachments
Exploit Takes advantage of a known hardware, software, network, or other vulnerability
Extortion Attacks or threatens to attack systems if target does not pay by the deadline
FileInfector Injects malicious code into executable files
Formjacking Uses an existing website to extract and copy data that users submit from an HTML form
Informationstealer Attempts to identify and copy sensitive or private information
Injection Exploits a vulnerable application by embedding malicious commands into request data
Keylogger Secretly monitors keystrokes and reports them back for collection
Loader Overrides the operating system's mechanism for loading and running programs and libraries
Maliciousscript Injects code fragments into a trusted website to compromise its security
Maninthebrowser Modifies a web browser to intercept and manipulate messages between the client and the server, typically to perform online transactions without the user's knowledge
Mineware Steals a system's resources (CPUs) to mine cryptocurrency
Mobilemalware Targets mobile devices, such as phones and tablets
Modular Targets a specific type of attack on a host after gathering system information and identifying vulnerabilities
Opensource Uses open source tools, such as penetration testing tools, to perform security attacks
Pathtraversal Exploits a vulnerable file system to access files and directories stored outside the web root folder
Phishing Sends an email that appears to be from a legitimate source but attempts to trick users into either providing sensitive information or running malicious programs
Pointofsale Uses point of sale (POS) and payment terminals to obtain credit card information and credentials
Proxy Uses an intermediary server between a user and the internet to help obfuscate the origin of requests
Pup A potentially unwanted program (PUP) is software that might compromise privacy or weaken security, and is often bundled with other programs
Ransomware Holds systems or data for ransom (typically through encryption) until a fee is paid
Rat A remote access trojan (RAT) program enables a remote actor to run commands on a target host by pretending to be legitimate software
Repurposedlegitimatesoftware Uses commercial or open source security tools that are normally used to detect or prevent threats
Rootkit Hides its files or processes from normal methods of monitoring to conceal its presence and activities
Solarwinds Attempts to exploit vulnerabilities in SolarWinds supply chain software
Spambot Sends large numbers of unsolicited emails, often as a vector for other types of attacks
Sqlinjectionattack Gains unauthorized access to a database by inserting malicious commands into legitimate SQL statements
Sshattack Attempts to modify login credentials for secure shell (SSH) access
Suspicious Is associated with unusual activity
Targeted Targets the resources or data of a specific organization or industry
Targetedcrimeware Steals the identities of users in a specific organization or industry to commit crimes like performing unauthorized financial transactions
Tor-exit-relay Uses The Onion Router (TOR) relays to conceal the source's identity
Vulnerabilityattack Exploits a hardware or software weakness to gain unauthorized access
Webattack Attacks web servers and their configurations
Webshell Enables persistent, unauthorized access to files on a web server though a command line interface
Xss Cross-site scripting (XSS) circumvents web server or client security by inserting malicious commands into web pages