MalOp Types in Depth
To help you better understand and classify all MalOps generated in your environment, the Cybereason platform further classifies MalOps based on their activity and detection types.
This section describes MalOp detection types and root causes. This section also provides recommended first steps for responding to each MalOp.
Note
The Cybereason platform also detects behaviors that do not generate MalOps but instead generate Evidence and Suspicion. The specifics of these behaviors are beyond the scope of this section. For more information, contact Customer Success.
- Blocklist MalOps
- Command and Control MalOps
- Credential Theft MalOps
- Elevated Access MalOps
- Extension Manipulation MalOps
- Known Malware MalOps
- Malicious Process MalOps
- Persistence MalOps
- Persistence MalOps - Research
- Process Injection MalOps
- Ransomware Malops
- Data Transmission Volume MalOps
- Malicious Process MalOps - Research
- Credential Theft MalOps - Research
- Elevated Access MalOps - Research
- Phishing MalOps - Research
- Reconnaissance MalOps - Research
- Potentially Unwanted Programs (PUP) MalOps
- Cybereason Mobile MalOps
- Supported Operating Systems for MalOps