Skip to content

Commit 3f450c4

Browse files
authored
Merge pull request #250 from puneethmeister/patch-7
Update mdo-threat-classification.md
2 parents 29e24e1 + b459298 commit 3f450c4

File tree

1 file changed

+23
-10
lines changed

1 file changed

+23
-10
lines changed

defender-office-365/mdo-threat-classification.md

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins can learn about threat classification in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 01/21/2025
19+
ms.date: 04/08/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -49,34 +49,47 @@ _Threat detections_ refer to the technologies and methodologies that are used to
4949

5050
_Threat classification_ is the process of categorizing a threat based on intent and the specific nature of the attack. The threat classification system uses LLMs, ML models, and other advanced techniques to understand the intent behind threats and provide a more accurate classification. As the system evolves, you can expect new threat classifications to keep pace with emerging attack methods.
5151

52-
Different threat classes are described in the following list:
52+
Currently available threat classes are described in the following list:
5353

5454
- **Advance fee scam**: Victims are promised large financial rewards, contracts, or prizes in exchange for upfront payments or a series of payments, which the attacker never delivers.
5555

56-
- **Business intelligence**: Requests for information regarding vendors or invoices, which are used by attackers to build a profile for further targeted attacks, often from a look-alike domain that mimics a trusted source.
56+
- **Adware**: A program that displays an advertisement that is out of context
5757

58-
- **Callback phishing**: Attackers use phone calls or other communication channels to manipulate individuals into revealing sensitive information or performing actions that compromise security.
58+
- **Business intelligence**: Requests for information regarding vendors or invoices, which are used by attackers to build a profile for further targeted attacks, often from a look-alike domain that mimics a trusted source.
5959

6060
- **Contact establishment**: Email messages (often generic text) to verify whether an inbox is active and to initiate a conversation. These messages aim to bypass security filters and build a trusted reputation for malicious future messages.
6161

62-
- **Credential phishing**: Attackers attempt to steal usernames and passwords by tricking individuals into entering their credentials on a fraudulent website or through manipulative email prompts.
63-
64-
- **Credit card collection**: Attackers attempt to steal credit card information and other personal details by deceiving individuals into providing their payment information through fake email messages, websites, or messages that appear legitimate.
65-
66-
- **Extortion**: The attacker threatens to release sensitive information, compromise systems, or take malicious actions unless a ransom is paid. This type of attack typically involves psychological manipulation to coerce the victim into compliance.
62+
- **Downloader**: A trojan that downloads other malware.
6763

6864
- **Gift cards**: Attackers impersonate trusted individuals or organizations, convincing the recipient to purchase and send gift card codes, often using social engineering tactics.
6965

66+
- **HackTool**: Tools that are used for hacking.
67+
7068
- **Invoice fraud**: Invoices that look legitimate, either by altering details of an existing invoice or submitting a fraudulent invoice, with the intent to trick recipients into making payments to the attacker.
7169

7270
- **Payroll fraud**: Manipulate users into updating payroll or personal account details to divert funds into the attacker's control.
7371

7472
- **Personally identifiable information (PII) gathering**: Attackers impersonate a high-ranking individual, such as a CEO, to request personal information. These email messages are often followed by a shift to external communication channels like WhatsApp or text messages to evade detection.
7573

76-
- **Social OAuth phishing**: Attackers use single sign-on (SSO) or OAuth services to deceive users into providing their sign in credentials, gaining unauthorized access to personal accounts.
74+
- **Ransom**: Software (often called ransomware) that prevents users from using or accessing their PC, usually for malicious purposes. The software might take the following actions:
75+
- Require users to pay (the ransom).
76+
- Encrypt files and other data.
77+
- Require users to do activities like answering surveys or CAPTCHAS to regain access to the machine.
78+
79+
Commonly, users can't move input device focus out of the ransomware, and users can't easily end the malicious process. In some cases, the ransomware denies PC access to users, even after a reboot or booting into Safe Mode.
80+
81+
- **Remote Access Trojan**: Softeare that gives attackers unauthorized remote access and control of infected computers. Bots are a subcategory of backdoor trojans.
82+
83+
- **Spyware**: Software that can steal information from an affected user beyond passwords.
7784

7885
- **Task fraud**: Short, seemingly safe email messages asking for assistance with a specific task. These requests are designed to gather information or induce actions that can compromise security.
7986

87+
<!--- - **Callback phishing**: Attackers use phone calls or other communication channels to manipulate individuals into revealing sensitive information or doing actions that compromise security.
88+
- **Credential phishing**: Attackers attempt to steal usernames and passwords by tricking individuals into entering their credentials on a fraudulent website or through manipulative email prompts.
89+
- **Extortion**: The attacker threatens to release sensitive information, compromise systems, or take malicious actions unless a ransom is paid. This type of attack typically involves psychological manipulation to coerce the victim into compliance.
90+
- **Social OAuth phishing**: Attackers use single sign-on (SSO) or OAuth services to deceive users into providing their sign in credentials, gaining unauthorized access to personal accounts.
91+
--->
92+
8093
## Where threat classification results are available
8194

8295
The results of threat classification are available in the following experiences in Defender for Office 365:

0 commit comments

Comments
 (0)