{"id":974,"date":"2011-09-22T14:57:38","date_gmt":"2011-09-22T14:57:38","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/blended-threat\/"},"modified":"2011-09-22T15:01:55","modified_gmt":"2011-09-22T15:01:55","slug":"blended-threat","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/39\/blended-threat","title":{"rendered":"Blended Threat"},"content":{"rendered":"
A blended threat is a type of exploit that uses multiple techniques to attack a system. The definition is broad, but this generally means propogating in multiple ways as well as attempting to use multiple vulnerabilities in the target system.<\/p>\n
To give a simplified example, a blended approach might send an e-mail with an attachment to the targeted computer. While the initial payload could be a virus in the attachment, it could also have worm-like capabilities to spread after making the original infection. Real life examples of blended threat programs include CodeRed and Bugbear.<\/p>\n
A significant percentage of modern malware are actually blended threats even though they are referred to as a “worm” or “virus.” This is especially true with botnets where exploits involve multiple forms of propagation, trojan-horse like functionality, and then the capability to launch a coordinated denial of service attack.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does Blended Threat Mean? A blended threat is a type of exploit that uses multiple techniques to attack a system. The definition is broad, but this generally means propogating in multiple ways as well as attempting to use multiple vulnerabilities in the target system. Techopedia Explains Blended Threat To give a simplified example, a […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218],"class_list":["post-974","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity"],"acf":[],"yoast_head":"\n