Risk event categories
Understand the different categories of threats identified by Risk events.
- Account takeover
- A nonauthorized user accesses an account.
- Brute force attack
- Suspected failed login attacks cover many scenarios. The failed logins are usually by one database user or by multiple database users on one database. The factors that are considered include the user, the timing, the frequency, and other actions taken by the suspicious user.
- Cross-site scripting (XSS)
- Cross-site scripting (XSS) attacks attempt to insert malicious JavaScript code into the server through client input fields and APIs. When such a script is in place, it is persistent and activated every time that a user accesses the affected page. A typical scenario inserts JavaScript through a web page and then runs every time that page is accessed.
- Data tampering
- A data tampering attack attempts to change or delete information. This type of attack typically exhibits a high volume of data deletion or removal.
- Denial of Service
- A denial of service attack attempts to impact service availability by creating excessively high demands on memory or resources or by causing server unavailability.
- Data Leak
- This attack is an attempt to retrieve data for unauthorized use.
- Global risk
- A Global risk is a pervasive and high-level risk that warrants further investigation. Similar suspicious activities were observed/spread/viewed on multiple assets but were not associated with any one specific asset.
- Massive grants
- Symptoms of massive grant attacks include granting many new privileges to various users and permissions that are being granted by users that don’t usually grant permissions.
- OS command injection
- These attacks are attempts to run commands on the operating system, from a client to a process. For example, inserting operating system commands to erase files or, in Guardium, to set outlier mining parameters with the goal of preempting the identification of attack symptoms. The attacker usually does not know whether the attack succeeded and uses tools like ping to check communication between its client and the server.
- Schema tampering
- Schema tampering is characterized by changes to database elements such as tables, views, or stored procedures.
- SQL Injection: Tautology
- In a tautology type attack, code is injected that uses the conditional operator OR and a query that evaluates to TRUE. Tautology-based SQL injection attacks usually bypass user authentication and extract data by inserting a tautology in the "WHERE" clause of an SQL query. The SQL query results transform the original condition into a tautology that causes, for example, all the rows in a database table to be open to an unauthorized user.
- SQL Injection: Side channel
- SQL injection attacks often result in a general error with no indication of the reason for failure. In side channel attacks, the attacker typically inserts code that has a "side effect" like sleeping for 2 seconds if an attack is successful. This technique allows the attacker to measure the side effect and determine whether the attack was successful. For example, the injected code might sleep for 2 seconds if the MySQL version in 5.6: if the request takes more than 2 seconds to return, the attacker confirms that the server is running MySQL 5.6.
- SQL Injection: Denial of Service
- A denial of service attack attempts to impact service availability by creating excessively high demands on memory or resources or by causing server unavailability.
- Uncategorized
- The Risk Engine was unable to categorize this event. Although this anomalous event does not fall under one of the pre-defined categories, it still suggests risk and warrants attention.