Skip to main content
Version: 2.14.0

Detection Types

Threat Detection

Dell Cyber data security identifies and responds to these threat categories. For details on how threat detection works, see the Threat Detection Overview documentation.

Threat NumberThreat CategoryTypeCategoryDescription
TD1Data Creation and DeletionRansomwareData Encryption and ManipulationCreation of new encrypted data while removing original data
TD2Data EncryptionRansomwareData Encryption and ManipulationCreation of new encrypted data with specific extension while removing original data
TD3Data RenamingRansomwareData Encryption and ManipulationReading data followed by bulk file renaming
TD6Security Guard Simulated AttackSystemSystem FunctionsAutomated self-test that simulates an attack to verify system functionality
TD7Suspicious ExtensionRansomwareSuspicious ActivitiesFile operations with extensions associated with ransomware (.blacksuit, .locky, .zzz)
TD9Mass DeleteData LossDestructive ActionsMultiple files or objects deleted from a single location
TD10Data Loss PreventionData TheftSuspicious ActivitiesExceeded access threshold for Data Loss Prevention triggers
TD11Honeypot ActivitySuspiciousSuspicious ActivitiesInteraction with honeypot files serving as tripwires across the file system
TD12Data OverwriteRansomwareData Encryption and ManipulationReading data followed by bulk overwriting of the same files
TD13Multi-Extension File ModificationRansomwareData Encryption and ManipulationReading data followed by renaming files to multiple different extensions
TD14Data EncryptionRansomwareData Encryption and ManipulationActivity matching known encryption patterns resulting in new encrypted data
TD15Data OverwriteRansomwareData Encryption and ManipulationReading data followed by overwriting the same objects
TD16Encryption Key ChangeRansomwareData Encryption and ManipulationCopying data with a new encryption key
TD17Data EncryptionRansomwareData Encryption and ManipulationCopying/uploading encrypted objects then deleting previous versions
TD18Data DeletionData LossDestructive ActionsBulk deletion of objects or buckets