Threat Catalogue
Cluster State Manipulation
criticalAttacker directly modifies cluster state in etcd, bypassing Kubernetes API server admission controllers and RBAC to create privileged workloads, modify RBAC rules, or corrupt cluster configuration
Container Escape
criticalAttacker breaks out of container isolation to access the host system
etcd Snapshot Exposure
criticalAttacker accesses etcd snapshots or backups which contain complete cluster state including all secrets, ConfigMaps, service account tokens, and RBAC configurations
Kubernetes Secrets Exposure
criticalAttacker accesses Kubernetes secrets stored in etcd, which may contain credentials, API keys, TLS certificates, and other sensitive data often stored without encryption-at-rest by default
Privilege Escalation
criticalAttacker elevates their access rights to gain higher-level permissions
Ransomware
criticalAdversary encrypts or destroys organisational data and demands payment for decryption. Modern variants combine encryption with double-extortion exfiltration, threatening to publish stolen data even if backups allow recovery. Cloud-targeted ransomware additionally abuses identity to delete snapshots, rotate KMS keys, or wipe object storage.
SQL Injection
criticalAttacker injects malicious SQL queries through user input to manipulate database operations
Unauthorized Remote Command Execution
criticalAttacker leverages management tools to execute unauthorized commands on target systems
Account Takeover
highAttacker gains control of user accounts through credential stuffing, phishing, or session hijacking
Authentication Token Theft
highAttacker steals authentication tokens to impersonate users or gain unauthorized access
Backup Data Exposure
highDatabase backups stored insecurely expose sensitive data
Batch Job Tampering
highAttacker modifies batch job definitions, scripts, or execution environment to execute malicious code or access unauthorized resources
Broken Authentication
highWeak authentication mechanisms allow attackers to compromise user accounts
Code Injection
highAttacker injects malicious code that gets executed by the application
Credential Theft
highAttackers steal credentials to gain unauthorized access to systems
Data Exfiltration
highUnauthorized extraction of sensitive data from the organization
Data Lake Governance Bypass
highAttacker circumvents data lake access controls, column/row-level security, or data masking policies to access restricted data
Distributed Consensus Disruption
highAttacker disrupts the Raft consensus protocol by manipulating leader election, injecting rogue members, or causing network partitions that lead to split-brain scenarios or data inconsistency
DNS Hijacking
highAdversary takes control of DNS resolution to redirect traffic to attacker-controlled infrastructure for credential capture, traffic interception, or malware delivery. Attack surfaces include compromised registrar accounts, unauthorised changes to authoritative records, resolver cache poisoning, and DNS rebinding attacks that abuse browser same-origin assumptions to reach internal services.
ETL Pipeline Manipulation
highAttacker modifies data transformation logic or job definitions to corrupt data, exfiltrate information, or inject malicious content
GraphQL API Abuse
highAttacker exploits GraphQL-specific vulnerabilities including query depth attacks, introspection abuse, batching attacks, or field-level authorization bypass
Hybrid Infrastructure Attack
highAttacker exploits hybrid cloud connections to pivot between on-premises and cloud environments or intercept traffic on dedicated connections
Insider Threat
highAuthorised individuals (employees, contractors, or partners) misuse legitimate access to exfiltrate data, sabotage systems, or commit fraud — either intentionally or through negligence. Distinct from credential theft because the actor already holds valid permissions, which makes detection dependent on behavioural rather than authentication signals.
Lateral Movement
highAttacker moves between systems within the network after initial compromise
Malware Infection
highMalicious software installed on systems to perform unauthorized actions
NoSQL Injection
highAttacker manipulates NoSQL queries through unsanitized input to access or modify data
OAuth Token Abuse
highAttackers exploit OAuth tokens to access connected applications, exfiltrate data, or perform unauthorized actions across integrated services
Phishing
highAdversary uses deceptive emails, messages, voice calls, or look-alike sites to trick users into revealing credentials, executing malicious payloads, or approving fraudulent transactions. Targeted variants (spearphishing, business email compromise) impersonate specific colleagues or vendors and are a primary initial-access vector for cloud account takeover.
Prompt Injection
highAttacker manipulates AI model inputs to bypass safety controls, extract sensitive information, or cause unintended behavior
Server-Side Request Forgery (SSRF)
highAttacker tricks server into making requests to internal resources or external systems
Storage Bucket Misconfiguration
highCloud storage buckets configured with overly permissive access policies
Supply Chain Attack
highMalicious code introduced through compromised dependencies or build processes
Unauthorized Access
highAttacker gains access to resources without proper authentication or authorization
Cache Poisoning
mediumAttacker injects malicious content into cache to serve compromised data to users
Data Classification Evasion
mediumAttacker structures, encodes, or obfuscates sensitive data to evade automated detection and classification systems
Data Exposure in Transit
mediumSensitive data transmitted between services may be exposed if not properly encrypted
Data Stream Hijacking
mediumAttacker intercepts or manipulates real-time data streams to inject false data or steal information
Email Spoofing
mediumAdversary forges email sender identity to impersonate trusted parties for phishing, fraud, or business email compromise. Enabled by missing or permissive SPF/DKIM/DMARC records, open mail relays, or look-alike domains; closely paired with phishing as the delivery technique but distinct in that the failure is in mail-authentication policy rather than user judgement.
Event Injection
mediumAttacker injects malicious events into event-driven systems to trigger unauthorized actions
Excessive Permissions
mediumServices or users granted more permissions than necessary for their function
Man-in-the-Middle Attack
mediumAttacker intercepts and potentially modifies communication between two connected services
Message Tampering
mediumAttacker modifies messages in transit between services
Model Extraction
mediumAttacker queries AI model systematically to reconstruct or steal proprietary model weights and architecture
Network Misconfiguration
mediumImproper network security group or firewall rules expose resources
Protocol Injection
mediumAttacker injects malicious data into the communication channel between services
Replay Attack
mediumAttacker captures and retransmits valid data transmissions to perform unauthorized actions
SaaS Data Leakage
mediumSensitive data unintentionally shared externally through SaaS collaboration features such as file sharing, public links, or guest access
Search Index Poisoning
mediumAttacker manipulates search indexes to inject malicious content, alter search rankings, or expose sensitive data through search results
Security Misconfiguration
mediumInsecure default configurations or incomplete setup creates security vulnerabilities
Sensitive Data Exposure
mediumSensitive data exposed through improper storage, transmission, or access controls
Shadow IT
mediumUnauthorized SaaS applications used by employees bypass security controls, create visibility gaps, and may expose corporate data
Third-Party Integration Risk
mediumInsecure integrations with third-party applications create attack vectors or expose sensitive data through connected services
Training Data Poisoning
mediumAttacker manipulates training data or fine-tuning datasets to introduce backdoors or biases into AI models
Unpatched Vulnerabilities
mediumKnown security vulnerabilities remain unpatched, enabling exploitation
Workflow Manipulation
mediumAttacker exploits workflow orchestration to bypass security controls or execute unauthorized steps
Audit Logging Bypass
lowAttacker disables or evades security logging to hide malicious activity
Connection Flooding
lowAttacker overwhelms the connection between services to disrupt communication
Denial of Service
lowAttack aimed at making services unavailable to legitimate users
Log Tampering
lowAttacker modifies or deletes logs to hide malicious activity
No threats match the current filters.