Threat Catalogue

STRIDE
Severity

Cluster State Manipulation

critical

Attacker directly modifies cluster state in etcd, bypassing Kubernetes API server admission controllers and RBAC to create privileged workloads, modify RBAC rules, or corrupt cluster configuration

TamperingElevation of Privilege

Container Escape

critical

Attacker breaks out of container isolation to access the host system

Elevation of PrivilegeTampering

etcd Snapshot Exposure

critical

Attacker accesses etcd snapshots or backups which contain complete cluster state including all secrets, ConfigMaps, service account tokens, and RBAC configurations

Information Disclosure

Kubernetes Secrets Exposure

critical

Attacker accesses Kubernetes secrets stored in etcd, which may contain credentials, API keys, TLS certificates, and other sensitive data often stored without encryption-at-rest by default

Information Disclosure

Privilege Escalation

critical

Attacker elevates their access rights to gain higher-level permissions

Elevation of Privilege

Ransomware

critical

Adversary encrypts or destroys organisational data and demands payment for decryption. Modern variants combine encryption with double-extortion exfiltration, threatening to publish stolen data even if backups allow recovery. Cloud-targeted ransomware additionally abuses identity to delete snapshots, rotate KMS keys, or wipe object storage.

TamperingDenial of ServiceInformation Disclosure

SQL Injection

critical

Attacker injects malicious SQL queries through user input to manipulate database operations

TamperingInformation Disclosure

Unauthorized Remote Command Execution

critical

Attacker leverages management tools to execute unauthorized commands on target systems

TamperingElevation of Privilege

Account Takeover

high

Attacker gains control of user accounts through credential stuffing, phishing, or session hijacking

SpoofingElevation of Privilege

Authentication Token Theft

high

Attacker steals authentication tokens to impersonate users or gain unauthorized access

SpoofingElevation of Privilege

Backup Data Exposure

high

Database backups stored insecurely expose sensitive data

Information Disclosure

Batch Job Tampering

high

Attacker modifies batch job definitions, scripts, or execution environment to execute malicious code or access unauthorized resources

TamperingElevation of Privilege

Broken Authentication

high

Weak authentication mechanisms allow attackers to compromise user accounts

Spoofing

Code Injection

high

Attacker injects malicious code that gets executed by the application

TamperingElevation of Privilege

Credential Theft

high

Attackers steal credentials to gain unauthorized access to systems

SpoofingElevation of Privilege

Data Exfiltration

high

Unauthorized extraction of sensitive data from the organization

Information Disclosure

Data Lake Governance Bypass

high

Attacker circumvents data lake access controls, column/row-level security, or data masking policies to access restricted data

Information DisclosureElevation of Privilege

Distributed Consensus Disruption

high

Attacker disrupts the Raft consensus protocol by manipulating leader election, injecting rogue members, or causing network partitions that lead to split-brain scenarios or data inconsistency

TamperingDenial of Service

DNS Hijacking

high

Adversary takes control of DNS resolution to redirect traffic to attacker-controlled infrastructure for credential capture, traffic interception, or malware delivery. Attack surfaces include compromised registrar accounts, unauthorised changes to authoritative records, resolver cache poisoning, and DNS rebinding attacks that abuse browser same-origin assumptions to reach internal services.

SpoofingTamperingInformation Disclosure

ETL Pipeline Manipulation

high

Attacker modifies data transformation logic or job definitions to corrupt data, exfiltrate information, or inject malicious content

TamperingInformation DisclosureElevation of Privilege

GraphQL API Abuse

high

Attacker exploits GraphQL-specific vulnerabilities including query depth attacks, introspection abuse, batching attacks, or field-level authorization bypass

Information DisclosureDenial of ServiceElevation of Privilege

Hybrid Infrastructure Attack

high

Attacker exploits hybrid cloud connections to pivot between on-premises and cloud environments or intercept traffic on dedicated connections

TamperingInformation DisclosureElevation of Privilege

Insider Threat

high

Authorised individuals (employees, contractors, or partners) misuse legitimate access to exfiltrate data, sabotage systems, or commit fraud — either intentionally or through negligence. Distinct from credential theft because the actor already holds valid permissions, which makes detection dependent on behavioural rather than authentication signals.

Information DisclosureTamperingRepudiation

Lateral Movement

high

Attacker moves between systems within the network after initial compromise

Elevation of Privilege

Malware Infection

high

Malicious software installed on systems to perform unauthorized actions

TamperingInformation DisclosureDenial of Service

NoSQL Injection

high

Attacker manipulates NoSQL queries through unsanitized input to access or modify data

TamperingInformation Disclosure

OAuth Token Abuse

high

Attackers exploit OAuth tokens to access connected applications, exfiltrate data, or perform unauthorized actions across integrated services

SpoofingElevation of PrivilegeInformation Disclosure

Phishing

high

Adversary uses deceptive emails, messages, voice calls, or look-alike sites to trick users into revealing credentials, executing malicious payloads, or approving fraudulent transactions. Targeted variants (spearphishing, business email compromise) impersonate specific colleagues or vendors and are a primary initial-access vector for cloud account takeover.

SpoofingInformation Disclosure

Prompt Injection

high

Attacker manipulates AI model inputs to bypass safety controls, extract sensitive information, or cause unintended behavior

TamperingInformation DisclosureElevation of Privilege

Server-Side Request Forgery (SSRF)

high

Attacker tricks server into making requests to internal resources or external systems

Information DisclosureElevation of Privilege

Storage Bucket Misconfiguration

high

Cloud storage buckets configured with overly permissive access policies

Information Disclosure

Supply Chain Attack

high

Malicious code introduced through compromised dependencies or build processes

TamperingElevation of Privilege

Unauthorized Access

high

Attacker gains access to resources without proper authentication or authorization

SpoofingElevation of Privilege

Cache Poisoning

medium

Attacker injects malicious content into cache to serve compromised data to users

TamperingInformation Disclosure

Data Classification Evasion

medium

Attacker structures, encodes, or obfuscates sensitive data to evade automated detection and classification systems

TamperingInformation Disclosure

Data Exposure in Transit

medium

Sensitive data transmitted between services may be exposed if not properly encrypted

Information Disclosure

Data Stream Hijacking

medium

Attacker intercepts or manipulates real-time data streams to inject false data or steal information

TamperingInformation DisclosureSpoofing

Email Spoofing

medium

Adversary forges email sender identity to impersonate trusted parties for phishing, fraud, or business email compromise. Enabled by missing or permissive SPF/DKIM/DMARC records, open mail relays, or look-alike domains; closely paired with phishing as the delivery technique but distinct in that the failure is in mail-authentication policy rather than user judgement.

SpoofingRepudiation

Event Injection

medium

Attacker injects malicious events into event-driven systems to trigger unauthorized actions

TamperingSpoofingElevation of Privilege

Excessive Permissions

medium

Services or users granted more permissions than necessary for their function

Elevation of PrivilegeInformation Disclosure

Man-in-the-Middle Attack

medium

Attacker intercepts and potentially modifies communication between two connected services

TamperingInformation DisclosureSpoofing

Message Tampering

medium

Attacker modifies messages in transit between services

TamperingRepudiation

Model Extraction

medium

Attacker queries AI model systematically to reconstruct or steal proprietary model weights and architecture

Information Disclosure

Network Misconfiguration

medium

Improper network security group or firewall rules expose resources

Information DisclosureTampering

Protocol Injection

medium

Attacker injects malicious data into the communication channel between services

TamperingElevation of Privilege

Replay Attack

medium

Attacker captures and retransmits valid data transmissions to perform unauthorized actions

SpoofingTampering

SaaS Data Leakage

medium

Sensitive data unintentionally shared externally through SaaS collaboration features such as file sharing, public links, or guest access

Information Disclosure

Search Index Poisoning

medium

Attacker manipulates search indexes to inject malicious content, alter search rankings, or expose sensitive data through search results

TamperingInformation Disclosure

Security Misconfiguration

medium

Insecure default configurations or incomplete setup creates security vulnerabilities

Information DisclosureElevation of Privilege

Sensitive Data Exposure

medium

Sensitive data exposed through improper storage, transmission, or access controls

Information Disclosure

Shadow IT

medium

Unauthorized SaaS applications used by employees bypass security controls, create visibility gaps, and may expose corporate data

Information DisclosureRepudiation

Third-Party Integration Risk

medium

Insecure integrations with third-party applications create attack vectors or expose sensitive data through connected services

Information DisclosureTamperingElevation of Privilege

Training Data Poisoning

medium

Attacker manipulates training data or fine-tuning datasets to introduce backdoors or biases into AI models

TamperingElevation of Privilege

Unpatched Vulnerabilities

medium

Known security vulnerabilities remain unpatched, enabling exploitation

TamperingElevation of PrivilegeDenial of Service

Workflow Manipulation

medium

Attacker exploits workflow orchestration to bypass security controls or execute unauthorized steps

TamperingElevation of Privilege

Audit Logging Bypass

low

Attacker disables or evades security logging to hide malicious activity

Repudiation

Connection Flooding

low

Attacker overwhelms the connection between services to disrupt communication

Denial of Service

Denial of Service

low

Attack aimed at making services unavailable to legitimate users

Denial of Service

Log Tampering

low

Attacker modifies or deletes logs to hide malicious activity

RepudiationTampering