Skip to content

MISP-Forms

common.png

MISP-Forms is a service designed to provide users with a set of intuitive forms for reporting various types of cyberattacks. These forms ensure that all relevant data is accurately captured and structured in a format that makes it actionable for law enforcement agencies, national authorities, and organizations such as CSIRTs (Computer Security Incident Response Teams). Below is a brief description of each form.


Phishing#

common.png

A phishing email is a deceptive message sent by attackers to trick recipients into revealing sensitive information, such as login credentials, credit card numbers, or personal data.

[More Information] [Report Incident]


Website Defacement#

common.png

An attack where an intruder gains unauthorized access to a website and alters its appearance or content. Typically, attackers replace the site's content with their own messages, often to display political or social statements, spread misinformation, or damage the site's reputation.

[More Information] [Report Incident]


Smishing#

common.png

Smishing is a type of phishing attack carried out through SMS (text messages). It involves cybercriminals sending fraudulent messages to trick recipients into revealing sensitive information, such as login credentials, financial details, or personal data.

[More Information] [Report Incident]


Denial-of-Service (DoS/DDoS)#

common.png

A malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of illegitimate requests.

[More Information] [Report Incident]


Cross-Site Scripting (XSS)#

common.png

This attack occurs when an attacker injects malicious scripts into trusted websites or applications, targeting unsuspecting users. Social XSS involves leveraging social engineering tactics to trick victims into interacting with malicious links or payloads.

[More Information] [Report Incident]


Quishing - Scam QR Code#

common.png

A type of phishing attack that uses QR codes to trick victims into revealing sensitive information or downloading malicious content. In these attacks, cybercriminals generate a QR code that, when scanned, redirects the victim to a fraudulent website designed to steal credentials, personal information, or payment details.

[More Information] [Report Incident]


Typo-Squatting#

common.png

A type of online scam where attackers create fake websites with names that are very similar to real, trusted websites, often by using common typing mistakes. For example, if the real website is "example.com", they might create "exmaple.com" or "examplle.com". When people accidentally visit these fake sites, they might be tricked into sharing personal information, downloading harmful software, or even making payments.

[More Information] [Report Incident]


Invoice Diversion Fraud#

common.png

Also known as Mandate Fraud or Business Email Compromise, this is a type of financial fraud where a scammer impersonates a legitimate supplier, vendor, or business partner and tricks the victim into redirecting payments to a fraudulent bank account.

[More Information] [Report Incident]


Scam or Suspicious Website#

common.png

a fake site designed to trick people into sharing personal information, such as passwords, credit card numbers, or other sensitive data, or to steal money by pretending to offer products, services, or opportunities.

[More Information] [Report Incident]


SQL Injection Attack#

common.png

A type of cyberattack where a hacker tricks a website into giving them unauthorized access to its database. They do this by entering special commands (instead of normal input) into a login form or search bar. If the website isn’t properly secured, it mistakenly runs those commands, allowing the hacker to steal, change, or even delete important data—like passwords, credit card details, or private messages.

[More Information] [Report Incident]


Malware Infection#

common.png

Any software designed to harm, steal, or disrupt a computer, network, or device. Hackers use malware to steal personal information, spy on users, damage files, or even take control of entire systems.

[More Information] [Report Incident]


Ransomware#

common.png

A type of malicious software that encrypts files on a computer or network, making them inaccessible to the user. The attacker then demands a ransom—usually in cryptocurrency—in exchange for a decryption key.

[More Information] [Report Incident]


Disinformation#

common.png

the deliberate spread of false or misleading information with the intent to deceive, manipulate public perception, or influence behavior. Unlike misinformation, which is false information shared without harmful intent, disinformation is intentionally crafted and distributed to achieve specific objectives, such as political influence, social division, or economic gain.

[More Information] [Report Incident]


Man-in-the-Middle#

common.png

An attack that occurs when an attacker secretly intercepts and possibly alters communication between two parties without them knowing. This allows the attacker to steal sensitive data, such as login credentials, financial information, or personal messages.

[More Information] [Report Incident]


Social Engineering#

common.png

a type of cyberattack that relies on psychological manipulation rather than technical hacking. Instead of breaking into systems, attackers trick people into giving up confidential information, such as passwords, financial details, or access to sensitive systems.

[More Information] [Report Incident]


Vishing (Voice Phishing)#

common.png

A type of fraud where attackers use phone calls to manipulate victims into revealing sensitive information, such as login credentials or financial details. Attackers often impersonate trusted entities, such as banks, government agencies, or tech support, to create a sense of urgency and pressure victims into compliance.

[More Information] [Report Incident]


Password Attack#

common.png

A type of cyber attack where an attacker tries to gain unauthorized access to a system, account, or network by cracking or stealing passwords. Since passwords are often the weakest link in security, attackers use various methods to guess, steal, or bypass them.

[More Information] [Report Incident]


Custom Report#

common.png

This form allows you to build a custom event consisting of selected attributes. You can select a category, choose an attribute type, and enter a value. You may add multiple attributes.

[Report Incident]