Threat Indicator Classifications Parent topic

The following table explains the threat indicators detected during scanning or analysis. View the table to understand the malicious activity affecting your network.

Threat Indicator Classifications

Threat Indicator
Classification
Ransomware
Malware that limits user access to a system either by locking the user out of the system or encrypts the user's files unless a ransom is paid.
Coin Miners
Malware used by attackers for cryptocurrency mining.
C&C Callbacks
Communication with Command and Control (C&C) servers, which are used to remotely send commands to, download malicious content to, or exfiltrate data from infected clients.
Suspicious Malware
Malicious software used by attackers to disrupt, control, steal, cause data loss, spy upon, or gain unauthorized access to computer systems.
Detections are included in this category if they are not included in the Suspicious Documents or Suspicious Scripts indicator categories.
Suspicious URLs
A domain or URL that links to an unknown malicious website.
Suspicious Documents
High risk detections for Office and PDF documents.
Suspicious Scripts
High risk detections for script files that exhibits malicious characteristics.
Script files include HTML, HTML application, JavaScript, Java jar/class, VB, Windows shell/script, BAT, and SVG files.
Important
Important
Always handle suspicious files with caution.