Skip to main content

AD_4nXdRJyxs-dazsFX1bBksOyQc9xmIba6ruH7-pI9JQFMBRjM-FUALbfqJnDOUnYccyNlo4zl5qoDx_DxVvFn-8T4KpDX0pdlolMM4179y27doerOiip4_K4_c58uxxDDRK4AG5zUXbnbUgmAIobMvW1IysE4?key=6E-uEKHvL6NjptB6gSiHeQ

Netskope Global Technical Success (GTS)

KB - Understanding Netskope's Predefined Web Category 'Security Risk' and Its Subcategories

 

Netskope uses the Security Risk category and applies to sites where security risks are pervasive and can directly threaten business availability. Security Risk is the parent category, and all those preceded with "Security Risk - " are subcategories of the parent.

Ref. - Link

Security Risk (main/parent category)

  • Security Risk subcategories
    • Security Risk - Ad Fraud
    • Security Risk - Attack
    • Security Risk - Botnets
    • Security Risk - Command and Control server
    • Security Risk - Compromised/malicious sites
    • Security Risk - Cryptocurrency Mining
    • Security Risk - DGA
    • Security Risk - Hacking
    • Security Risk - Malware Call-Home
    • Security Risk - Malware Distribution Point
    • Security Risk - Miscellaneous
    • Security Risk - Phishing/Fraud
    • Security Risk - Spam sites
    • Security Risk - Spyware & Questionable Software

URLs categorized under "Security Risk" in Netskope encompass a broad spectrum of websites or webpages that exhibit behaviors or content known to pose significant potential threats to users and networks. These threats encompass various forms of malicious activities:

  • Malware Distribution: Websites categorized as "Security Risk" are often hubs for distributing malware. This includes viruses, trojans, ransomware, and other malicious software designed to exploit vulnerabilities in user systems. Accessing these sites can lead to unintended downloads or installations of malware, compromising device security and potentially leading to data loss or system disruption.

 

  • Phishing and Fraud: This category includes websites that engage in phishing attacks. Phishing sites mimic legitimate websites to trick users into divulging sensitive information such as usernames, passwords, or financial details. They often employ deceptive tactics, such as fake login pages or urgent messages, to exploit user trust and extract valuable personal or corporate data.

 

  • Scams and Fraudulent Activities: Websites categorized under "Security Risk" may also promote scams or fraudulent schemes. These sites aim to deceive users into participating in illegitimate activities, such as fake lottery winnings, fraudulent investment opportunities, or misleading product sales. Users who interact with such sites may suffer financial losses or have their personal information misused.

 

  • Illegal Content: This category encompasses websites that host illegal or illicit content, including pirated software, copyrighted material distributed without authorization, or content related to illegal activities such as drug trafficking, weapons sales, or hacking tools. Accessing these sites not only violates legal regulations but also exposes users to legal repercussions and security risks.

 

  • Untrusted Sources: Websites categorized under "Security Risk" may also include those with a history of suspicious or unreliable behavior. This could involve frequent association with malware distribution networks, involvement in cybercriminal activities, or being identified as sources of malicious traffic. Engaging with such sites can expose users and networks to elevated risks of malware infections, data breaches, or other security incidents.

 

  • Drive-by Downloads: Websites categorized as "Security Risk" may initiate drive-by downloads. These are automatic downloads that occur without the user's consent or knowledge, often exploiting vulnerabilities in web browsers or plugins. Drive-by downloads can result in the installation of malware or unwanted software on the user's device.

 

  • Exploit Kits: Some "Security Risk" websites host exploit kits, which are tools used by attackers to identify and exploit vulnerabilities in software running on users' devices. These kits can automatically deliver malware payloads tailored to exploit specific vulnerabilities, leading to device compromise and potential data theft.

 

  • Command and Control (C&C) Servers: Websites categorized under "Security Risk" may act as command and control servers for botnets or other malicious networks. These servers are used by cybercriminals to remotely control infected devices, execute commands, and steal data. Accessing these sites can expose devices to infiltration and unauthorized remote control.

 

  • Fake or Deceptive Content: This includes websites that deceive users with false promises, fake products, or misleading information. Examples include websites offering counterfeit goods, fake antivirus software, or deceptive advertisements that lead users to inadvertently download malware or disclose personal information.

 

  • High-Risk Domains: Domains categorized under "Security Risk" may be flagged due to their association with suspicious or high-risk activities. This could include domains registered recently, domains with unusual or random strings in their names (typical of domain generation algorithms used by malware), or domains frequently involved in malicious campaigns.

 

  • Blacklisted Sources: Websites categorized under "Security Risk" may be listed on industry or community blacklists due to their reputation for hosting malicious content or engaging in harmful activities. Accessing these sites can trigger security alerts and may violate organizational policies aimed at protecting against known threats.

 

  • Social Engineering Attacks: Websites categorized under "Security Risk" may employ social engineering tactics to manipulate users into taking actions that compromise security. This includes fake surveys, quizzes, or contests designed to extract personal information or encourage users to click on dangerous links.

 

Netskope Recommendation

  • Netskope strongly advises prioritizing the proactive blocking of all categories categorized under 'Security Risk,' including its sub-categories, as a critical security measure.
  • Placing this policy at the top of your order is essential to maximize its effectiveness in safeguarding your network and data.
  • In the event that Netskope flags any destination as a Security Risk, and you require additional details, we encourage you to promptly contact Netskope Customer Support.

 

Terms and Conditions

  • All documented information undergoes testing and verification to ensure accuracy.
  • In the future, If any such platform changes are brought to our attention, we will promptly update the documentation to reflect them.

 

Notes

  • Customers have the flexibility to customize the template according to their preferences.
  • This article is authored by Netskope Global Technical Success (GTS).
  • For any further inquiries related to this article, please contact Netskope GTS by submitting a support case with 'Case Type – How To Questions'.