Articles on: Threats

Threat Risk Levels (Low, Medium, High, Critical)

Threat Risk Levels (Low, Medium, High, Critical)


Every threat detected in Selki is assigned a Risk Level, which represents the potential impact and urgency of the exposure.

Risk levels help security teams prioritize which compromised identities require immediate action and which can be reviewed with lower urgency.


The four severity levels in Selki are:


  • Low
  • Medium
  • High
  • Critical


These appear in both the Threats List and the threat filters.



How Selki Determines Risk Levels


Risk levels are assigned automatically based on a combination of:


1. Source of Exposure

Some sources inherently represent higher risk:

  • Infostealer data → typically High or Critical
  • Recent breach dumps → often Medium or High
  • Public paste sites → varies by context


2. Password Availability

If an exposure includes a password (plaintext, hashed, or partially redacted), risk increases significantly.


3. Recency of Exposure

Data from active malware logs or recent breaches carries higher threat weight.


4. Identity Type

Employee exposures may carry higher institutional risk than customer threats.


5. Exposure Patterns

Multiple occurrences, repeated exposures, or cross-source detection elevate risk.


These criteria work together to determine the final severity.



Risk Level Breakdown


Below is what each risk level represents operationally:



Low Risk


These exposures have minimal immediate impact and typically include:


  • historical breach data
  • hashed passwords with low probability of cracking
  • old or incomplete metadata
  • low-value accounts or disposable identities


Recommended action:

Review when convenient; no immediate escalation needed.



Medium Risk


Moderate exposures that still require investigation:


  • breach data that includes partial sensitive details
  • exposures of customer accounts with no password attached
  • identities seen once but still potentially exploitable


Recommended action:

Review within standard monitoring cycles.



High Risk


Exposures that pose a meaningful security threat:


  • infostealer logs without passwords
  • exposures with multiple occurrences
  • identities tied to important roles or internal systems


Recommended action:

Prioritize investigation and remediation soon.



Critical Risk


The highest-level threat, requiring immediate action:


  • infostealer leaks with passwords
  • sessions or credentials from infected devices
  • repeated exposures in multiple sources
  • compromised employee accounts
  • anything with real-time or near-real-time exploitation potential


Recommended action:

Immediate remediation.

Force password resets, notify the affected user, and investigate potential misuse.



Using Risk Levels in Workflow


Risk levels assist teams in:


  • triaging threats at scale
  • building remediation queues
  • assigning priority to analysts
  • reporting and analytics
  • monitoring critical domains or teams


They are especially powerful when combined with filters such as:


  • Category (Employee vs Customer)
  • Watchers (Domains)
  • Status (Active vs Closed)



Summary


Risk levels in Selki provide a clear, structured way to assess the severity of each identity exposure.

By understanding Low, Medium, High, and Critical risks, your team can react faster, prevent account compromise, and reduce operational impact.



Next Article


Article 6 – Threat Types & Sources (Infostealer, Breach, Paste, etc.)


Updated on: 01/12/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!