Web

Intent Detection – Categories

Threat Intent

Traditionally, security tools focus on identifying whether a URL is malicious. Threat Intent goes a step further by answering:

  • What is the attacker trying to achieve?
  • How is the user being targeted?
  • What signals led to this classification?

How It Works

Each detected phish or scam URL is analyzed to determine:

  1. Threat Intent – The primary goal of the attack
  2. Threat Intent Summary – A short explanation of why the URL was categorized this way based on key signals found on the page (e.g., login forms, fake branding, redirect behavior)

Threat Intent Categories

Below are the supported Threat Intent categories and what they represent:

  • Brand Impersonation
    Cloned or lookalike brand page designed to appear legitimate, without directly capturing credentials.
  • Domain Parking
    Domain parked/for-sale but using brand name or assets.
  • Credential Harvesting
    Login or authentication page designed to steal user credentials (email, password, SSO).
  • Info Stealer
    Collects sensitive personal or financial information beyond credentials (credit card, SSN, phone number, address)
  • OAuth Phishing
    Fake authorization or consent flows attempting to gain access via OAuth or SSO permissions.
  • Business Email Compromise (BEC)
    Fake invoices, wire requests, or executive impersonation targeting financial transactions.
  • Gift Card Scam
    Reward card scam, requests for gift cards or prepaid cards under false pretenses.
  • Online Store
    Fraudulent e-commerce sites designed to collect payments without delivering goods.
  • Malware Distribution
    Pages offering fake downloads, updates, or software that install malicious payloads.
  • Captcha Lure
    Fake CAPTCHA pages used to trick users into enabling push notifications or triggering malicious actions.
  • Redirect
    Pages that automatically redirect users to another malicious destination.
  • Social Engineering
    Uses urgency, fear, or incentives (e.g., prizes) to manipulate users without directly collecting credentials.
  • Tech Support Scam
    Fake support pages urging users to call or interact with fraudulent customer service.
  • Warning
    Fake security warning, virus alert, or browser alert.

Where to Access Threat Intent

Threat Intent and Threat Intent Summary are available across both table views and visualizations in the Web module.

Table Views (Takedown Malicious & Post Malicious)

You can access Threat Intent directly in the table views:

  1. Navigate to Takedown Malicious or Post Malicious
  2. Open the column selector (table settings)
  3. Enable:
    • Threat Intent
    • Threat Intent Summary

Once enabled, these columns will display for each URL, giving you immediate visibility into the attacker’s objective and the reasoning behind the classification.

Takedown Activity

Threat Intent is also integrated into Takedown Activity, where it powers key visualizations:

  • Volume View – Understand distribution of threats by intey
  • Time View – Analyze which providers are most associated with specific threat intents and how takedowns are progressing

This allows you to move beyond raw counts and gain a clearer understanding of what types of attacks are happening, where they are hosted, and how effectively they are being mitigated over time.

Categories

Bolster’s classification model uses deep learning and natural language processing to analyze webpage content and behavior, classifying pages into the following categories:

Bolster’s Intent Detection model leverages the capabilities of deep learning and natural language processing to detect the intent of a webpage. Currently, the model can classify webpages into the following categories.

Category
Name
Category Mnemonic (for API calls)Description
Sensitive Datasensitive_dataWebpages asking for user’s login or personal information
Shopping/
eCommerce
online_storeWebpages selling products/services online
CryptocurrencycryptoWebpages with cryptocurrency-related content
GamblinggamblingOnline gambling, casinos, and betting websites
GaminggamingOnline gaming websites
CaptchacaptchaWebpages asking users to fill in a captcha
Promo Codepromo_codeWebpages claiming to give away promo codes of any brand
Tech Supporttech_supportWebpages prompting users to call a tech support number
SurveysurveyWebpages asking users to fill in a survey
Gift Cardgift_cardWebpages claiming to give away gift cards to users
Hacked Websiteshacked_siteWebsites that have been hacked
Domain Parkingdomain_parkingWebsites that do not host active content, but are registered and parked for later use/ sale
Pharmacy/
Drug
pharmaWebpages containing content about pharmacies and drug stores
StreamingstreamingWebsites streaming movies, tv shows, live games and other content
Error Pageserror_pageWebpages that display error messages
Directory Listingdirectory_listingWebpages that display the directory with files/ folders
BankingbankingWebsites related to banks
WarningwarningWebpages displaying a warning sign against potential phishing/ malicious pages
HealthhealthWebsites that contain health-related content
App storeapp_storeDistribution platforms for mobile applications online

Contact
contactWebpages offering users an opportunity to contact the organization
BECbecWebpages that ask users to sign in, but are not associated with any brand. These webpages are used to carry out BEC scams.
AdultadultWebsites hosting adult/ NSFW content