Threat Indicator Database Threat Types
Threat Intelligence categorizes threats by different characteristics, including the methods used by the threat actor to compromise the target system's security, and the threat's symptoms.
| Type | Description | 
|---|---|
Adware | 
Presents unwanted advertisements to users | 
Anomalous | 
Is associated with unusual activity but might not be a threat | 
Atm_malware | 
Uses automated teller machine (ATM) terminals to obtain bank card information and credentials | 
Backdoor | 
Provides access to systems or data without normal authentication or encryption | 
Banking | 
Targets financial institutions and banks | 
Botnets | 
Uses a network of compromised, Internet-connected computers | 
Bruteforce | 
Systematically tries many combinations of usernames and passwords | 
Clickfraud | 
Simulates a user clicking an advertisement to generate revenue for the ad publisher | 
Commandcontrol | 
Takes control of a computer that issues commands to other infected computers | 
Commandinjection | 
Exploits a vulnerable application to run malicious commands on the host operating system | 
Commodity | 
Uses readily available tools with little or no customization to perform security attacks | 
Credentialharvesting | 
Identifies valid credentials for a system, often to sell or distribute to other actors | 
Criminal | 
Uses tools that are typically sold and distributed by criminal organizations | 
Cryptocurrencytheft | 
Infects blockchain or financial software to perform unauthorized transfers of cryptocurrency | 
Denialofservice | 
Floods a target computer with requests so that it can't fulfill legitimate requests | 
DeploymentFramework | 
Uses commercial or open source orchestration tools to deploy malware | 
Downloader | 
Downloads and runs malware by pretending to be legitimate software | 
Dropper | 
Installs a malicious program by pretending to be legitimate software | 
Emailattack | 
Floods a target system with email messages, or sends emails containing malicious links or attachments | 
Exploit | 
Takes advantage of a known hardware, software, network, or other vulnerability | 
Extortion | 
Attacks or threatens to attack systems if target does not pay by the deadline | 
FileInfector | 
Injects malicious code into executable files | 
Formjacking | 
Uses an existing website to extract and copy data that users submit from an HTML form | 
Informationstealer | 
Attempts to identify and copy sensitive or private information | 
Injection | 
Exploits a vulnerable application by embedding malicious commands into request data | 
Keylogger | 
Secretly monitors keystrokes and reports them back for collection | 
Loader | 
Overrides the operating system's mechanism for loading and running programs and libraries | 
Maliciousscript | 
Injects code fragments into a trusted website to compromise its security | 
Maninthebrowser | 
Modifies a web browser to intercept and manipulate messages between the client and the server, typically to perform online transactions without the user's knowledge | 
Mineware | 
Steals a system's resources (CPUs) to mine cryptocurrency | 
Mobilemalware | 
Targets mobile devices, such as phones and tablets | 
Modular | 
Targets a specific type of attack on a host after gathering system information and identifying vulnerabilities | 
Opensource | 
Uses open source tools, such as penetration testing tools, to perform security attacks | 
Pathtraversal | 
Exploits a vulnerable file system to access files and directories stored outside the web root folder | 
Phishing | 
Sends an email that appears to be from a legitimate source but attempts to trick users into either providing sensitive information or running malicious programs | 
Pointofsale | 
Uses point of sale (POS) and payment terminals to obtain credit card information and credentials | 
Proxy | 
Uses an intermediary server between a user and the internet to help obfuscate the origin of requests | 
Pup | 
A potentially unwanted program (PUP) is software that might compromise privacy or weaken security, and is often bundled with other programs | 
Ransomware | 
Holds systems or data for ransom (typically through encryption) until a fee is paid | 
Rat | 
A remote access trojan (RAT) program enables a remote actor to run commands on a target host by pretending to be legitimate software | 
Repurposedlegitimatesoftware | 
Uses commercial or open source security tools that are normally used to detect or prevent threats | 
Rootkit | 
Hides its files or processes from normal methods of monitoring to conceal its presence and activities | 
Solarwinds | 
Attempts to exploit vulnerabilities in SolarWinds supply chain software | 
Spambot | 
Sends large numbers of unsolicited emails, often as a vector for other types of attacks | 
Sqlinjectionattack | 
Gains unauthorized access to a database by inserting malicious commands into legitimate SQL statements | 
Sshattack | 
Attempts to modify login credentials for secure shell (SSH) access | 
Suspicious | 
Is associated with unusual activity | 
Targeted | 
Targets the resources or data of a specific organization or industry | 
Targetedcrimeware | 
Steals the identities of users in a specific organization or industry to commit crimes like performing unauthorized financial transactions | 
Tor-exit-relay | 
Uses The Onion Router (TOR) relays to conceal the source's identity | 
Vulnerabilityattack | 
Exploits a hardware or software weakness to gain unauthorized access | 
Webattack | 
Attacks web servers and their configurations | 
Webshell | 
Enables persistent, unauthorized access to files on a web server though a command line interface | 
Xss
 | 
Cross-site scripting (XSS) circumvents web server or client security by inserting malicious commands into web pages |