Skip to content

Commit 89a010e

Browse files
committed
update exploitation phases and diagram
1 parent 5ff4203 commit 89a010e

1 file changed

Lines changed: 54 additions & 14 deletions

File tree

crowdsec-docs/unversioned/tracker_api/exploitation_phases.mdx

Lines changed: 54 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Every tracked CVE and fingerprint rule is assigned an **exploitation phase** tha
99

1010
The phases are determined by analyzing exploitation telemetry from the CrowdSec Network over time — they reflect real attacker behavior, not theoretical risk.
1111

12-
## The Five Phases
12+
## The Phases
1313

1414
### Insufficient Data
1515

@@ -19,6 +19,22 @@ This is the starting state for newly tracked CVEs or those affecting products wi
1919

2020
**What to do**: Fall back to traditional risk indicators (CVSS score, public exploit availability, vendor advisory severity) until CrowdSec telemetry matures for this CVE. Check back periodically as the phase will update when sufficient data is collected.
2121

22+
### Early Exploitation
23+
24+
> *"Early exploitation attempts have been observed, but activity remains limited and not yet widespread."*
25+
26+
CrowdSec is picking up the first real signals — scan traffic or small-scale exploit attempts. It's not yet a campaign. This phase often appears in the days after a public PoC drops for a CVE that hasn't been widely weaponized yet.
27+
28+
**What to do**: Begin prioritizing this CVE for patching. The window between Early Exploitation and a broader campaign can be short — track momentum closely and reassess frequently.
29+
30+
### Fresh and Popular
31+
32+
> *"The vulnerability is recent and currently shows strong attacker interest with rapidly increasing exploitation activity."*
33+
34+
This CVE is gaining rapid traction in the attacker community. Volume is growing fast and multiple actors are experimenting with it. It may be on the verge of tipping into Mass Exploitation.
35+
36+
**What to do**: Treat this as high urgency. Patch immediately if possible. Deploy blocklists proactively — don't wait for confirmed hits on your infrastructure.
37+
2238
### Unpopular
2339

2440
> *"The vulnerability is known but shows very limited attacker interest or exploitation activity."*
@@ -53,39 +69,60 @@ The vulnerability has been weaponized at scale. Multiple threat actor groups are
5369

5470
**What to do**: Treat this as an emergency if you haven't patched yet. Verify patch status across your entire estate. Deploy blocklists immediately. Monitor for signs of compromise, as exploitation may have occurred before you acted.
5571

72+
### Wearing Out
73+
74+
> *"Exploitation activity is decreasing over time, likely due to patch adoption or reduced attacker interest."*
75+
76+
The peak campaign has passed. Patch adoption is reducing the attack surface and/or attackers have moved on. Activity is still present but on a clear downward trend.
77+
78+
**What to do**: If you haven't patched yet, do it now while the pressure is lower. This phase is a second chance — exploitation is easier to attribute and less noisy than at peak.
79+
5680
## Phase Transitions
5781

5882
CVEs don't always move linearly through these phases. Common patterns include:
5983

60-
- **Newly published CVE with public exploit**: May jump directly from *Insufficient Data* to *Targeted Exploitation* or *Mass Exploitation* if attackers weaponize it quickly.
61-
- **Old CVE with new exploit toolkit**: A CVE that was *Background Noise* for years can escalate to *Mass Exploitation* when it gets added to a popular exploit framework.
62-
- **Campaign ends**: A CVE in *Mass Exploitation* can settle back to *Background Noise* once the initial campaign runs its course and most targets are patched.
63-
- **Steady state**: Many CVEs stabilize in *Background Noise* indefinitely — they remain part of automated scanning toolkits long after the initial threat subsides.
84+
- **New PoC drops**: A CVE moves from *Insufficient Data* to *Early Exploitation* within days of a public proof-of-concept being published.
85+
- **Rapid weaponization**: *Early Exploitation* escalates to *Fresh and Popular* when multiple threat actors adopt the CVE simultaneously.
86+
- **Fresh and Popular → Mass Exploitation**: The most common escalation path for high-impact CVEs in widely deployed software when no effective mitigation is available.
87+
- **Fresh and Popular → Wearing Out**: Some CVEs peak quickly and decline before ever reaching mass scale — the community patches fast or the target surface is limited.
88+
- **Old CVE with new exploit toolkit**: A CVE in *Background Noise* for years can escalate to *Targeted Exploitation* or *Mass Exploitation* when added to a popular exploit framework.
89+
- **Campaign ends → Wearing Out**: After a *Mass Exploitation* or *Targeted Exploitation* campaign concludes, activity enters a decline.
90+
- **Wearing Out → Background Noise**: Residual automated scanning typically continues long-term, settling into steady-state low-level activity.
6491

6592
```mermaid
6693
graph TB
6794
ID(["Insufficient Data"]):::gray
95+
EE(["Early Exploitation"]):::early
96+
FP(["Fresh & Popular"]):::fresh
6897
UP(["Unpopular"]):::green
6998
BN(["Background Noise"]):::blue
7099
TE(["Targeted Exploitation"]):::orange
71100
ME(["Mass Exploitation"]):::red
101+
WO(["Wearing Out"]):::fading
72102
103+
ID --> EE
73104
ID --> UP
74-
ID --> BN
75-
ID -->|fast escalation| TE
76-
ID -->|fast escalation| ME
77-
UP --> TE
78-
BN --> TE
79-
BN -->|new exploit toolkit| ME
105+
EE --> FP
106+
EE --> TE
107+
EE --> BN
108+
FP --> ME
109+
FP --> TE
110+
FP --> WO
80111
TE --> ME
81-
TE -->|campaign ends| BN
82-
ME -->|campaign ends| BN
112+
TE --> WO
113+
ME --> WO
114+
WO --> BN
115+
WO --> UP
116+
BN --> TE
83117
84118
classDef gray fill:#C3BEF3,stroke:#5D54B0,color:#3b2f7e
119+
classDef early fill:#4C91C2,stroke:#2d6a94,color:#fff
120+
classDef fresh fill:#F17C4E,stroke:#c45a28,color:#fff
85121
classDef green fill:#3EBB3E,stroke:#2d8b2d,color:#fff
86122
classDef blue fill:#FFC343,stroke:#c8942a,color:#3b2f00
87123
classDef orange fill:#E21717,stroke:#a00f0f,color:#fff
88124
classDef red fill:#9F6B04,stroke:#6b4700,color:#fff
125+
classDef fading fill:#B90C85,stroke:#7d0857,color:#fff
89126
```
90127

91128
## Phases and Scores Together
@@ -101,9 +138,12 @@ Typical ranges observed in practice:
101138
| Phase | Typical CrowdSec Score | Typical Opportunity Score | Typical Momentum Score |
102139
|-------|----------------------|--------------------------|----------------------|
103140
| Insufficient Data | 0–9 | 0–5 | 0–5 |
141+
| Early Exploitation | 2–6 | 1–3 | 2–5 |
142+
| Fresh and Popular | 5–9 | 2–4 | 4–5 |
104143
| Unpopular | 1–7 | 1–2 | 0–5 |
105144
| Background Noise | 1–6 | 1–2 | 0–5 |
106145
| Targeted Exploitation | 7–8 | 4–5 | 2–4 |
107146
| Mass Exploitation | 3–7 | 1–5 | 0–4 |
147+
| Wearing Out | 1–5 | 1–3 | 0–2 |
108148

109-
Targeted Exploitation is the most predictable: it consistently shows high Opportunity scores (4–5) and elevated CrowdSec Scores. Other phases are more loosely correlated — Background Noise and Unpopular overlap significantly in score ranges, and Mass Exploitation spans a wide range depending on whether the campaign is ramping up or fading.
149+
Targeted Exploitation is the most predictable: it consistently shows high Opportunity scores (4–5) and elevated CrowdSec Scores. Fresh and Popular stands out for its high Momentum (4–5), reflecting the rapid growth in activity. Wearing Out is characterized by low and falling Momentum. Other phases are more loosely correlated — Background Noise and Unpopular overlap significantly in score ranges.

0 commit comments

Comments
 (0)