Skip to content

Commit fd6008a

Browse files
authored
Ransomware activity alert (#881)
1 parent 860f2a9 commit fd6008a

File tree

1 file changed

+71
-0
lines changed

1 file changed

+71
-0
lines changed

content/guides/events/event-triggers/shield-alert-events.md

Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ The possible alerts produced by Shield are for:
2727
2. Suspicious sessions
2828
3. Anomalous downloads
2929
4. Malicious content
30+
5. Ransomware activity (part of Shield Pro)
3031

3132
All Shield threat detection alert events are produced within the
3233
[enterprise event][events] stream. These events follow the
@@ -339,6 +340,76 @@ The `additional_details` payload will provide the following details:
339340
}
340341
```
341342

343+
### Ransomware activity alert
344+
345+
<!--alex ignore-->
346+
347+
A ransomware activity alert is produced when Box Shield identifies suspicious file extensions that may be indicative of a ransomware attack. It can be identified by the Ransomware Activity value within `additional_details.shield_alert.rule_category`.
348+
349+
The `additional_details` payload will provide the following details:
350+
351+
<!--alex enable-->
352+
353+
```json
354+
{
355+
"source": null,
356+
"created_by": {
357+
"type": "user",
358+
"id": "2",
359+
"name": "Unknown User",
360+
"login": ""
361+
},
362+
"action_by": null,
363+
"created_at": "2025-08-19T10:44:26-07:00",
364+
"event_id": "5b508973-0e48-4bc1-80b2-a05b5382eb37",
365+
"event_type": "SHIELD_ALERT",
366+
"ip_address": "1.2.3.4",
367+
"type": "event",
368+
"session_id": null,
369+
"additional_details": {
370+
"shield_alert": {
371+
"rule_category": "Ransomware Activity",
372+
"rule_id": "1234",
373+
"rule_name": "Ransomware Detection",
374+
"rule_response_action": null,
375+
"risk_score": 100,
376+
"alert_summary": {
377+
"total_files_affected": 42,
378+
"ip_details": [
379+
{
380+
"ip": "1.2.3.4",
381+
"registrant": "Microsoft Corporation",
382+
"latitude": "37.5555",
383+
"longitude": "-120.6789",
384+
"city_name": "San Jose",
385+
"region_name": "California",
386+
"country_code": "US"
387+
}
388+
],
389+
"suspicious_file_extensions": [
390+
"lockbit"
391+
],
392+
"anomaly_period": {
393+
"date_range": {
394+
"start_date": "2009-02-13T23:31:30Z",
395+
"end_date": "2009-02-13T23:31:30Z"
396+
}
397+
}
398+
},
399+
"alert_id": 1234,
400+
"priority": "medium",
401+
"user": {
402+
"id": 8167630149,
403+
"name": "Some user",
404+
"email": "[email protected]"
405+
},
406+
"link": "https://app.box.com/master/shield/alerts/1234",
407+
"created_at": "2025-08-19T10:44:26-07:00"
408+
}
409+
}
410+
}
411+
```
412+
342413
<!-- i18n-enable localize-links -->
343414
[box-shield]: https://www.box.com/shield
344415
[threatdetect]:https://support.box.com/hc/en-us/articles/360044196113-Using-Threat-Detection

0 commit comments

Comments
 (0)