Reference of event types used in Guardian Ops abuse classification
AuthFailure
- Authentication failure attemptsBackdoor
- Backdoor installations or accessBlacklist
- IP addresses appearing on security blacklistsCompromisedAccount
- Compromised user accountsCompromisedServer
- Compromised servers or systemsCompromisedWebsite
- Compromised websitesDDos
- Coordinated efforts to overwhelm systems with excessive trafficDDosAmplification
- Exploitation of amplification vulnerabilities to magnify DDoS attacksDefacement
- Website defacementDNSBlocklist
- DNS-based blocklist entriesDNSProblems
- Fraudulent messages from compromised DNS/email serversExploit
- Software or commands that exploit system vulnerabilities to compromise securityIPReclamation
- IP prefix hijacking or unauthorized IP address useIpSpoof
- IP address spoofingLoginAttack
- Repeated unauthorized attempts to gain access to systems or accountsMaliciousActivity
- General malicious activityMalwareHosting
- Hosting malicious contentOutdatedDNSSEC
- Outdated DNSSEC configurationsPortScan
- Systematic attempts to discover open ports and potential vulnerabilitiesRogueDNS
- Rogue DNS servicesSSLFreak
- SSL FREAK vulnerabilitySSLPoodle
- SSL POODLE vulnerabilityTrap
- Honeypot or trap hitsUnknown
- Used when content is too broad to categorize specificallyWebCrawler
- Automated web crawling and indexing activityWebHack
- Web application attacksCensorship
- Censorship-related contentChildAbuse
- Child abuse materialCopyright
- Copyright infringementDoxing
- Doxing or personal information exposureFraud
- Fraudulent activitiesHarassment
- Online harassmentIllegalAdvertisement
- Illegal advertisingNotSpam
- MARF reports marked as not spamPhishing
- Phishing attacksPropaganda
- Propaganda contentSpam
- Email spamSpamvertised
- Content advertised through spamTrademark
- Trademark infringementCompromisedMicrosoftExchange
- Compromised Microsoft Exchange serversconficker
, zeus
)CVE-2021-44228
)