Articles on: Threats

The Threats Table

Selki Threat Management System - Infostealer Detection


Overview

The Threat Management System provides comprehensive monitoring and detection of infostealer malware threats that may have compromised user credentials. This system helps organizations identify both internal employee compromises and external customer credential breaches through automated collection and analysis of infostealer logs.


Understanding the Threats List Interface

Main Dashboard

The Threats List dashboard displays all detected infostealer threats in a centralized table format. Key features include:

  • Active Threats: Currently open threats requiring attention (shown with count)
  • Closed Threats: Previously resolved threats that have been mitigated
  • Search Functionality: Full-text search across all threat data
  • Filtering Options: Filter by description, type, user, password, and collection date


Threat Categories by Type

Threats are categorized into two main types:

  • Employees: Internal staff credentials that have been compromised
  • Customers: External customer credentials detected in infostealer logs
  • Others: Miscellaneous credential types


The Threats Table



Uncover the infected username and password by hovering your mouse cursor over each field.


Security Features

For security and privacy protection:

  • User and Password columns are blurred by default
  • Hover to reveal: Credentials become visible only when hovering over the specific field
  • This prevents accidental exposure while allowing authorized personnel to view necessary details


Risk Level Classification System

The system automatically categorizes threats into four distinct risk levels:

🔴 Critical

  • Trigger: Employee credentials have been compromised
  • Impact: Highest risk due to potential internal system access
  • Priority: Immediate attention required

🟠 High

  • Trigger: External customer credentials have been compromised
  • Impact: Customer data breach risk and reputational damage
  • Priority: Urgent response needed

🔵 Medium

  • Trigger: Infection occurred within the last 6 months
  • Impact: Recent compromise with active threat potential
  • Priority: Timely investigation recommended

🔵 Low

  • Trigger: Infection is older than 6 months
  • Impact: Historical compromise with reduced immediate risk
  • Priority: Can be addressed during routine security reviews


Common Infostealer Families

The system detects various infostealer malware families, each with distinct characteristics:

Lummac2

  • Type: Credential harvesting malware
  • Targets: Login credentials, browser data, cryptocurrency wallets
  • Distribution: Often spread through malicious email attachments or compromised websites
  • Detection: Appears frequently in the threat logs as shown in the screenshots


Other Common Families

While not visible in the current screenshots, typical infostealer families include:

  • Redline: Popular credential stealer targeting browsers and applications
  • Vidar: Focuses on browser data, cryptocurrency wallets, and system information
  • Raccoon: Comprehensive data stealer with modular capabilities
  • Mars: Browser-focused stealer with cryptocurrency wallet targeting
  • Azorult: Multi-purpose stealer with data exfiltration capabilities


Threat Details View

Accessing Detailed Information

Click on any threat to open the detailed view panel, which provides:

Key Threat Attributes

  • Threat ID: Unique identifier for tracking (e.g., CM9LACKYZ005HYPYNK2X0S2KT)
  • Status: Current state (Open/Closed)
  • Family: Specific malware variant (e.g., Lummac2)
  • Type: Category classification (Users/Employees/Customers)
  • Threat Level: Risk assessment (Critical/High/Medium/Low)
  • Watcher: Monitoring source (e.g., 2Degrees)
  • Domain: Affected domain (e.g., 2degrees.nz)
  • Full URL: Complete compromised URL
  • Collection Date: When the threat was first detected
  • Infection Date: When the initial compromise occurred (if known)
  • IP Address: Source IP of the infection (may be Unknown)


Threat Management Workflow

1. Detection and Triage

  • Threats are automatically collected and categorized
  • Risk levels are assigned based on the classification criteria
  • New threats appear in the Active Threats list


2. Investigation

  • Security teams review threat details
  • Analyze infection paths and affected systems
  • Determine scope of compromise


3. Mitigation

  • Reset compromised credentials
  • Implement additional security measures
  • Notify affected users if necessary
  • Document remediation actions


4. Closure

  • Mark threats as "Closed" after successful mitigation
  • Threats move from Active to Closed status
  • Maintain records for compliance and reporting


Search and Filter Capabilities

Search Functions

  • Global Search: Search across all threat data fields
  • Real-time Results: Instant filtering as you type
  • Comprehensive Coverage: Searches descriptions, URLs, domains, and metadata


Filter Options

  • Description: Filter by threat description or malware family
  • Type: Filter by Employee, Customer, or Other categories
  • User: Search for specific compromised usernames
  • Password: Filter by password-related criteria
  • Collection Date: Filter by when threats were detected
  • Actions: Filter by available actions or status


Best Practices

Regular Monitoring

  • Review Active Threats daily, prioritizing Critical and High-risk items
  • Monitor trends in infostealer family distribution
  • Track closure rates and response times


Incident Response

  • Establish clear escalation procedures for Critical threats
  • Maintain communication protocols for customer notification
  • Document all remediation actions for compliance


Preventive Measures

  • Implement user security awareness training
  • Deploy endpoint detection and response (EDR) solutions
  • Maintain updated antivirus and anti-malware protection
  • Regular security assessments and penetration testing


Reporting and Analytics

The system provides insights into:

  • Threat volume trends over time
  • Most common infostealer families
  • Response time metrics
  • Risk level distribution
  • Affected domain analysis

Updated on: 14/08/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!