Learn about the threat types, security risks, and detection signals in Correlated Intelligence.
Threat Types
The following table lists the threat types that Correlated Intelligence can
detect.
Threat Type
|
Description
|
Phishing - Advanced Phishing
|
A type of phishing that uses more sophisticated techniques to
evade detection systems. For example, advanced phishing uses
anti-bot mechanisms to prevent security solutions from accessing
the email content for analysis, or it can redirect to a
legitimate web page instead showing a phishing website to
security solutions.
|
Phishing - Data Exfiltration
|
A type of phishing that uses various techniques to steal users'
data, such as credentials. For example, it might leverage
existing form services to show a fake login page to users.
|
Suspicious Email
|
Email with unusual traits that appear suspicious and may signal
potential threats.
|
Possibly Unwanted Email
|
Email that may be unsolicited and deemed undesirable or
unnecessary by the recipient.
|
Security Risks
The following table lists the security risks that Correlated Intelligence can
detect.
Security Risk
|
Threat Type
|
Description
|
Phishing Email with Anti-bot Mechanisms |
Phishing - Advanced Phishing
|
The email shows anti-bot behavior, such as using CAPTCHA,
returning blank pages, or restricting access to specific
regions.
|
Adversary-in-The-Middle (AiTM) Phishing for Session Cookie
Theft
|
The email uses AiTM techniques to steal session cookies to bypass
MFA and gain access even without credentials.
|
|
Quishing Email
|
The email contains a QR code that stores a phishing URL which
directs users to a malicious website.
|
|
Phishing Intention and Detection Evasion
|
The email asks you to perform credentials related actions and
contains URLs that use techniques like anti-bot mechanisms and
CAPTCHA to evade detection.
|
|
Quishing Email with Anti-bot Behavior
|
This is a quishing email that leverages advanced techniques to
evade detection, such as by directing users to a file stored in
a legitimate file sharing service that contains the actual
phishing link.
|
|
Phishing Attachment for Credential Theft
|
Phishing - Data Exfiltration
|
The email attempts to steal the user’s credentials by using an
email attachment (such as HTML or PDF file) with phishing
links.
|
Anomalies
The following table lists the anomalies that Correlated Intelligence can detect.
Security Risk
|
Threat Type
|
Description
|
Possible Quishing Email |
Suspicious Email
|
The email contains a QR code that stores a URL. Moreover, the
email is from a low-activity sender or the URL shows anti-bot
behavior.
|
Unusual DocuSign Email
|
The email claims to come from Docusign, but is from a
low-activity sender or contains a URL that shows anti-bot
behavior.
|
|
Possible Phishing Intention and Detection Evasion
|
The email appears to prompt you to perform credential related
actions and contains URLs that likely use techniques like
anti-bot mechanisms and CAPTCHA to evade detection.
|
|
Email with Possible Invisible Prompts
|
The email likely contains invisible prompts which may be an
attempt from the sender to exploit the recipient’s AI tools.
|
|
Possibly Unwanted Marketing Email
|
Possibly Unwanted Email
|
The email shows one or more traits that are typical of
unsolicited marketing messages.
|
Possibly Unwanted Webinar Email
|
The email shows one or more traits that are typical of
unsolicited Webinar messages.
|
|
Possibly Unwanted Notification
|
The email is a cloud app notification that might be
undesirable.
|
Detection Signals
The following tables shows the signals that Correlated Intelligence correlates to
identify security risks and anomalies.
Detection Signal
|
Description
|
Possible Brand Impersonation
|
The email claims to come from a brand but does not align with the
normal patterns of this brand.
|
Newly Observed Sender
|
The sender has not sent any email in the observable past,
potentially being exploited for malicious purposes.
|
Account Request in Attachment
|
The email asks you to reset passwords, re-activate accounts, or
perform other credential related operations in its attachment,
possibly indicating phishing intentions.
|
HTML Obfuscation
|
The HTML attachment uses advanced obfuscation methods to encode
all of its content, possibly to evade analysis by detection
systems.
|
Form Service Abuse in Attachment
|
The email uses a popular form service in its attachment,
potentially exploiting the service to trick users into revealing
their personal information.
|
CAPTCHA Challenge by Suspicious Website
|
The website is rarely seen or flagged for suspicious activities
and is using CAPTCHA verification, potentially tricking users
into trusting the website and preventing detection systems from
analyzing it.
|
Possibly Suspicious Domain
|
This is a low-activity domain, which is either newly observed or
have been created long ago. This type of domains is frequently
exploited by malicious websites.
|
Encoded Email Address in URL
|
The email contains a URL with encoded email address, which is
often exploited to make the website appear trustworthy by
autofilling the credentials and showing a seemingly authentic
login page.
|
QR Code for URL
|
The QR code in the email stores a URL.
|
Phishing URL in QR Code
|
The URL stored in the email is a phishing link that directs users
to a malicious website.
|
Email with Docusign Traits
|
The email contains traits typical of Docusign. It might come from
Docusign or a malicious actor impersonating Docusign.
|
File Sharing Service Abuse
|
The email uses a file sharing service frequently abused by
malicious actors, possibly exploiting this service to trick
users into downloading suspicious files.
|
Marketing Email Traits
|
The email shows one or more traits that are typical of
unsolicited marketing messages.
|
Webinar Email Traits
|
The email shows one or more traits that are typical of
unsolicited Webinar messages.
|
Cloud App Notification
|
The email is a cloud app notification that might be
undesirable.
|
Credential Verification Request
|
The email contains requests for recipients to log in or change
password.
|
Purchase or Shipment Notification
|
The email is a notification about a purchase or shipment.
|
Urgent Request
|
The email shows a sense of urgency by requesting the recipient to
take immediate action.
|
Account or Service Error
|
The email informs the recipient that something is wrong with
their account or service.
|
Request to Access External Resource
|
The email asks the recipient to access an external resource, such
as a website or an online document.
|
Email with Possible Invisible Prompts
|
The email likely contains invisible prompts which may be an
attempt from the sender to exploit the recipient’s AI tools.
|