Threat Categories

The RST Cloud engine categorises various types of malicious and unwanted activities to give you more control over exactly what you’d like to detect and block in your environment.

The table below outlines various categories related to malicious activities as tracked by the RST Threat Feed. Our focus is mainly on significant attacks or incidents, but we also cover useful categories such as proxies, VPNs, and cryptomining, as detection engineering professionals can use them to define more complex detection logic.

Category Description
General category for items that don't fit into any other specific category
Hosts associated with distributing or hosting malware, malvertising, malspam, and malicious documents. Used when no other specific category is assigned but the indicator is stated as malicious by a TI source
Hosts providing unauthorised remote access to a system, often used by attackers after initial compromise
Bots engaged in malicious activities such as scraping, spamming, or attacking websites
Hosts distributing banker malware targeting online banking credentials, including clipbanker
Hosts distributing bootkit malware that affects the system's boot process
Nodes in a botnet, including those comprised of IoT devices
Command and control servers used to manage and communicate with compromised systems
Hosts distributing clicker malware, which generates fraudulent clicks on ads or web elements
Hosts engaged in cryptomining or coin mining, which may or may not be malicious
Hosts involved in distributed denial-of-service (DDoS) attacks or offering DDoS-as-a-service
Hosts abusing DNS, such as for malicious redirects or tunneling
Hosts distributing downloader malware that installs additional malicious software onto infected systems
Hosts involved in draining, the act of transferring funds or assets fraudulently
Hosts distributing droppers, programs designed to install malware onto a system, sometimes offered as a service
Hosts involved in fraudulent activities including e-skimmers, carding, and other financial fraud
Hosts distributing keyloggers, including remote and PowerShell-based keyloggers that capture keystrokes
Indicators related to phishing (fraudulent attempts to obtain sensitive information), vishing, smishing, whaling, and smishing-as-a-service
Free and paid proxy services used to perform attacks or conceal attackers' activities
Hosts involved in ransomware-as-a-service (RaaS), offering ransomware as a service to other attackers
Hosts distributing ransomware that encrypts files and demands ransom for decryption, including cryptolockers
Hosts distributing remote access trojans (RATs) that allow attackers to control infected systems remotely
Hosts distributing rootkits, malicious software designed to hide other malware and gain root access
Hosts involved in scamming activities including scams-as-a-service, where scammers offer their services to others
Hosts involved in scanning activities, including network scanning and probing
Hosts distributing screenshotter malware that captures screenshots of infected systems
Hosts probing for SSH, RDP, and VNC access, indicating attempts to find open access points
Hosts known for sending unsolicited and unwanted emails or messages
Hosts distributing spyware, software that secretly monitors and collects user information
Hosts distributing stealers designed to steal information, including cryptocurrencies
Nodes in the TOR network that serve as exit points, often used to anonymize malicious activity
General nodes within the TOR network, including both entry and relay nodes
Hosts involved in distributing or facilitating torrent-based file sharing, often used for illegal content
Hosts distributing trojans, malicious programs disguised as legitimate software
Free and paid VPN services used to perform attacks or conceal attackers' activities
Hosts distributing vulndrivers that exploit vulnerabilities in system drivers
Hosts involved in attacks against websites, such as SQL injection, cross-site scripting, or other web-based attacks
Hosts distributing wiper malware that destroys data on infected systems, including polymorphic variants

 

While categories like spam or DDoS are included, our feed does not cover all possible values for these categories, as indicators for such activities are often ineffective. Instead, we concentrate on instances linked to noteworthy malicious events. This approach helps in targeting impactful threats more effectively.