Threat Context
Overview
The threat_context object provides geographic and industry-level intelligence about exploitation activity for a given CVE or reconnaissance rule. While scores tell you how urgent a threat is and exploitation phases tell you where in the lifecycle it sits, threat context answers a different set of questions:
- Where are attacks coming from? (attacker countries)
- Who is being targeted? (defender countries, industry types, risk profiles)
- What do attackers want? (attacker objectives)
All distributions are percentage-based and sum to approximately 100. The top entries are listed individually, with an OTHER bucket aggregating the remainder.
Attacker Countries
Shows the geographic distribution of attack traffic as observed by the CrowdSec Network. Keys are ISO 3166-1 alpha-2 country codes; values are percentages.
"attacker_countries": {
"US": 48,
"IE": 18,
"DE": 7,
"FR": 5,
"NL": 4,
"SG": 4,
"GB": 2,
"AE": 2,
"VN": 1,
"OTHER": 10
}
Defender Countries
Shows which countries' infrastructure is being targeted, using the same format as attacker countries.
"defender_countries": {
"HU": 22,
"FR": 22,
"US": 12,
"DE": 10,
"AT": 8,
"SM": 4,
"SG": 3,
"BE": 3,
"NL": 2,
"OTHER": 15
}
Industry Types
Shows the distribution of targeted organizations by industry sector.
| Value | Description |
|---|---|
commerce | Retail, e-commerce, and commercial businesses |
education | Schools, universities, and educational institutions |
financial_services | Banks, insurance, fintech, financial institutions |
government | Government agencies and public administration |
healthcare | Healthcare providers, hospitals, medical organizations |
industry | Manufacturing, industrial, and production organizations |
media | Media, entertainment, and publishing organizations |
non_profit | Non-profit organizations, NGOs, charities |
SOHO | Small office / home office environments |
"industry_types": {
"financial_services": 1,
"commerce": 71,
"government": 4,
"healthcare": 5,
"non_profit": 19
}
Industry Risk Profiles
Classifies targets by their technology risk profile rather than their business sector. This provides a complementary lens to industry types — two organizations in the same industry may have very different exposure depending on their technology stack.
| Value | Description |
|---|---|
critical_infrastructure | Energy, water, transportation, telecommunications |
public_service | Government services, education, public utilities |
SOHO | Small office / home office environments |
technology_business | Technology-focused businesses, SaaS, software companies |
traditional_business | Non-tech commercial enterprises, manufacturing, logistics |
"industry_risk_profiles": {
"critical_infrastructure": 6,
"traditional_business": 6,
"public_service": 6,
"technology_business": 65,
"SOHO": 17
}
Attacker Objectives
Shows the inferred goals of the exploitation campaigns.
| Value | Description |
|---|---|
data_exfiltration | Stealing sensitive data for sale, espionage, or leverage |
infrastructure_takeover | Gaining persistent control of target systems (botnets, cryptomining, proxying) |
ransomware | Encryption-based extortion campaigns |
"attacker_objectives": {
"ransomware": 7,
"data_exfiltration": 11,
"infrastructure_takeover": 82
}
Practical Example
Accessing Threat Context
- Web Interface: Available on each CVE and Reconnaissance Rule detail page in the Live Exploit Tracker.
- API: Returned in the
threat_contextfield of the CVE endpoints (/v1/cvesand/v1/cves/{cve_id}) and Fingerprint endpoints (/v1/fingerprintsand/v1/fingerprints/{fingerprint}).