![]() |
![]() |
![]() |
![]() |
Working with RiskVision Incidents : RiskVision attack stage definitions
|
Recon: content explicitly used for reconnaissance with malicious intent (threat stage 1)
|
|||||||||||||||
Lure: content that lures the user and starts the infection chain (threat stage 2)
|
|||||||||||||||
Redirection: a URL or host that represents a connection point between the lure and the exploit page or other payload (threat stage 3)
|
|||||||||||||||
|
|||||||||||||||
Dropper File: traffic associated with a malicious or unwanted file that is downloaded to the victim's machine after either a successful exploit attempt or a successful social engineering trick (threat stage 5)
|
|||||||||||||||
|
|||||||||||||||
Data Theft: content that contains stolen data (threat stage 7)
|
![]() |
Obfuscation: obfuscated web content that fits different threat stages once the obfuscation is removed.
|
![]() |
Evasion: web pages that are used to evade a proxy (goes with the Proxy Avoidance category).
|
![]() |
Detection Test: test web pages designed to test that the detection capability of a product deployment (e.g., EICAR files or Forcepoint test portal, etc.)
|
![]() |
Threat is used as a generic reason code for malicious content that does not fit a more specific threat type, or has not yet been assigned another reason code.
|
![]() |
Suspicious Script: a script with suspicious traits that could be malicious or unwanted.
|
![]() |
Suspicious Iframe: an iframe with suspicious traits that could be malicious or unwanted.
|
![]() |
Risk: a page with suspicious artifacts that may be malicious or unwanted. Used as a generic reason code for content deemed suspicious based on reputation.
|
![]() |
![]() |
![]() |
![]() |
Working with RiskVision Incidents : RiskVision attack stage definitions
|