Table: Targeted attack types
Targeted attack type |
Technology detected |
Volume and statistics |
Theme or topic |
Actor (senders and recipients) |
Type 1 |
New malware Examples:
|
A high likelihood of a targeted attack Indicators:
|
The email campaign is either highlyspecific or highly relevant to the recipient. |
Highly specific recipients. |
Type 2 |
Advanced malware technology Example: Recently discovered exploit that uses newly-found malware technology. |
A medium likelihood of a targeted attack Indicators:
|
|
Recipients that have a common link through industry, country, or region. |
Type 3 |
Different malware technologies with common characteristics Examples:
|
A medium likelihood of a targeted attack Indicators:
|
|
Recipients that have a common link through industry, country, or region. |
Advanced Threat Protection: Email assigns a severity level to each incident. Table: Threat severity ratings describes what each severity level means.
Severity level |
Factors for classification |
Critical |
An email that is infected with malware was delivered. The email was not quarantined because the malware was detected after the email was delivered. |
High |
The incident is part of any type of targeted attack. |
Medium |
The message includes an advanced malware technology that has been used in a recent Type 1 or Type 2 targeted attack. |
Low |
All other incidents that are not associated with a targeted attack. |
More Information
Targeted attack types