Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
206
345
label
stringclasses
4 values
DNS hijacking affecting digital infrastructure domain resolution causing sustained service disruption for 25 organizations. [SEP] sectors: digital infrastructure, banking relevance: systemic ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: true
O3
DNS hijacking affecting banking domain resolution causing sustained service degradation for 5 entities. [SEP] sectors: banking, research, space, food production, transport relevance: high_relevance ms_affected: 2 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
Operational technology network bridge exploit in chemicals causing partial safety system degradation. [SEP] sectors: chemicals, financial market, drinking water, digital providers, public administration relevance: essential ms_affected: 5 cross_border: none coordination: eu_active capacity_exceeded: true
O3
Operational technology network bridge exploit in public administration triggering partial safety system degradation. [SEP] sectors: public administration, chemicals relevance: essential ms_affected: 3 cross_border: systemic coordination: eu_info capacity_exceeded: true
O4
Social engineering attack on energy help desk leading to none data access for 25 accounts. [SEP] sectors: energy, food production relevance: non_essential ms_affected: 2 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
SSH key compromise in chemicals jump servers enabling cross sector lateral access across 2 network zones. [SEP] sectors: chemicals, manufacturing relevance: high_relevance ms_affected: 2 cross_border: limited coordination: national capacity_exceeded: false
O2
Data poisoning compromise on food production machine learning models with none integrity compromise. [SEP] sectors: food production, postal courier relevance: systemic ms_affected: 8 cross_border: none coordination: eu_active capacity_exceeded: false
O4
Container escape in digital providers Kubernetes clusters causing none lateral movement across 5 namespaces. [SEP] sectors: digital providers, manufacturing, waste management, research, health relevance: essential ms_affected: 5 cross_border: systemic coordination: national capacity_exceeded: false
O2
Data poisoning attack on waste management machine learning models with operational integrity compromise. [SEP] sectors: waste management, research relevance: high_relevance ms_affected: 1 cross_border: none coordination: eu_info capacity_exceeded: false
O2
Cloud misconfiguration exposing manufacturing storage buckets with none data of 12 customers. [SEP] sectors: manufacturing, food production relevance: essential ms_affected: 2 cross_border: none coordination: full_ipcr capacity_exceeded: false
O4
OAuth token theft from digital infrastructure identity providers touching 5 federated services. [SEP] sectors: digital infrastructure, financial market relevance: essential ms_affected: 8 cross_border: significant coordination: eu_active capacity_exceeded: true
O3
Encrypted channel abuse by malware in digital infrastructure networks evading detection with operational data exfiltration. [SEP] sectors: digital infrastructure, research relevance: systemic ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Encrypted channel abuse by malware in financial market networks evading detection with none data exfiltration. [SEP] sectors: financial market relevance: systemic ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Phishing campaign against space operators with sensitive credential theft impacting 5 entities. [SEP] sectors: space, public administration relevance: systemic ms_affected: 3 cross_border: systemic coordination: national capacity_exceeded: false
O1
Mass scanning and exploitation campaign against health exposed services affecting 12 unpatched systems. [SEP] sectors: health, postal courier, waste water relevance: systemic ms_affected: 5 cross_border: systemic coordination: eu_info capacity_exceeded: true
O4
Container escape in food production Kubernetes clusters causing limited lateral movement across 1 namespaces. [SEP] sectors: food production relevance: essential ms_affected: 1 cross_border: none coordination: eu_info capacity_exceeded: false
O2
Wiper malware deployed against digital providers systems triggering sustained destruction of operational data. [SEP] sectors: digital providers relevance: essential ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Zero-day exploitation in postal courier control systems producing sustained operational degradation. [SEP] sectors: postal courier, education relevance: non_essential ms_affected: 3 cross_border: none coordination: national capacity_exceeded: false
O1
SQL injection against manufacturing databases resulting in operational data breach across 12 records systems. [SEP] sectors: manufacturing, digital infrastructure relevance: non_essential ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Log4j-style vulnerability in drinking water Java applications involving 1 instances with significant service impact. [SEP] sectors: drinking water, waste water, health relevance: high_relevance ms_affected: 1 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
DNS hijacking involving chemicals domain resolution resulting in significant service disruption for 25 organizations. [SEP] sectors: chemicals, banking, energy relevance: non_essential ms_affected: 3 cross_border: none coordination: eu_active capacity_exceeded: false
O3
SQL injection against education databases resulting in none data breach across 25 records systems. [SEP] sectors: education, research relevance: non_essential ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Cloud misconfiguration exposing health storage buckets with none data of 1 customers. [SEP] sectors: health, financial market relevance: high_relevance ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Encrypted channel abuse by malware in digital infrastructure networks evading detection with operational data exfiltration. [SEP] sectors: digital infrastructure, research relevance: systemic ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Phishing campaign against education operators with none credential theft impacting 1 entities. [SEP] sectors: education, digital providers relevance: systemic ms_affected: 3 cross_border: systemic coordination: national capacity_exceeded: false
O1
Firmware tampering in postal courier IoT devices causing cross sector cascading failures in 5 sectors. [SEP] sectors: postal courier, waste water, drinking water, digital providers, financial market relevance: essential ms_affected: 8 cross_border: systemic coordination: eu_info capacity_exceeded: false
O2
Power grid cyber-physical attack on drinking water SCADA producing significant disruption with cross sector cascading effects. [SEP] sectors: drinking water relevance: high_relevance ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: false
O2
API abuse targeting energy cloud services causing significant rate limiting and outages. [SEP] sectors: energy, banking relevance: high_relevance ms_affected: 2 cross_border: systemic coordination: national capacity_exceeded: false
O1
API abuse targeting ict service management cloud services causing partial rate limiting and outages. [SEP] sectors: ict service management relevance: systemic ms_affected: 5 cross_border: limited coordination: full_ipcr capacity_exceeded: false
O4
Ransomware attack on research provider resulting in sustained disruption to core services impacting 5 entities across 1 sectors. [SEP] sectors: research relevance: essential ms_affected: 2 cross_border: significant coordination: full_ipcr capacity_exceeded: true
O4
Watering hole attack targeting manufacturing personnel websites with operational credential harvesting. [SEP] sectors: manufacturing relevance: high_relevance ms_affected: 8 cross_border: significant coordination: eu_active capacity_exceeded: false
O3
Wiper malware deployed against chemicals systems causing complete destruction of operational data. [SEP] sectors: chemicals, manufacturing relevance: essential ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Operational technology network bridge exploit in financial market triggering complete safety system degradation. [SEP] sectors: financial market, digital providers relevance: high_relevance ms_affected: 1 cross_border: limited coordination: eu_info capacity_exceeded: true
O3
Wiper malware deployed against health systems causing significant destruction of operational data. [SEP] sectors: health relevance: high_relevance ms_affected: 3 cross_border: systemic coordination: full_ipcr capacity_exceeded: true
O4
Wiper malware deployed against space systems causing sustained destruction of operational data. [SEP] sectors: space, energy relevance: essential ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Bluetooth vulnerability exploited in digital providers medical devices impacting 12 hospital systems. [SEP] sectors: digital providers, transport, energy relevance: non_essential ms_affected: 5 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
OAuth token theft from digital infrastructure identity providers affecting 1 federated services. [SEP] sectors: digital infrastructure, energy relevance: essential ms_affected: 1 cross_border: limited coordination: eu_info capacity_exceeded: true
O3
With sensitive data exfiltration, encrypted channel abuse by malware in public administration networks evading detection. [SEP] sectors: public administration relevance: systemic ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
BGP route leak impacting ict service management network connectivity with significant impairment across 2 sectors. [SEP] sectors: ict service management, digital providers relevance: non_essential ms_affected: 5 cross_border: none coordination: national capacity_exceeded: false
O1
Botnet infection across space endpoints with complete service degradation impacting 25 sites. [SEP] sectors: space, transport, waste management, banking, research relevance: essential ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: false
O2
Watering hole attack targeting research personnel websites with none credential harvesting. [SEP] sectors: research, transport, manufacturing, public administration, digital infrastructure relevance: high_relevance ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: true
O3
Botnet infection across education endpoints with partial service degradation affecting 55 sites. [SEP] sectors: education, public administration relevance: non_essential ms_affected: 2 cross_border: none coordination: national capacity_exceeded: false
O1
Bluetooth vulnerability exploited in space medical devices affecting 1 hospital systems. [SEP] sectors: space, waste water, financial market relevance: high_relevance ms_affected: 3 cross_border: limited coordination: eu_info capacity_exceeded: false
O3
Botnet infection across postal courier endpoints with partial service degradation impacting 1 sites. [SEP] sectors: postal courier, chemicals, transport, public administration, manufacturing relevance: non_essential ms_affected: 3 cross_border: none coordination: eu_info capacity_exceeded: false
O2
Deepfake-assisted social engineering targeting waste management leadership with operational access to 5 strategic systems. [SEP] sectors: waste management, drinking water relevance: non_essential ms_affected: 5 cross_border: none coordination: eu_info capacity_exceeded: true
O3
Brute force breach on space authentication infrastructure leading to partial access degradation for 55 users. [SEP] sectors: space relevance: high_relevance ms_affected: 5 cross_border: systemic coordination: national capacity_exceeded: true
O4
Deepfake-assisted social engineering impacting banking leadership with operational access to 5 strategic systems. [SEP] sectors: banking relevance: high_relevance ms_affected: 2 cross_border: none coordination: national capacity_exceeded: false
O1
USB-based malware introduced into digital infrastructure air-gapped systems causing none data bridge. [SEP] sectors: digital infrastructure relevance: high_relevance ms_affected: 8 cross_border: systemic coordination: eu_active capacity_exceeded: true
O4
With sustained service degradation affecting 1 sites, botnet infection across waste water endpoints. [SEP] sectors: waste water, chemicals relevance: essential ms_affected: 2 cross_border: none coordination: full_ipcr capacity_exceeded: true
O4
Brute force attack on waste water authentication platforms leading to sustained access disruption for 12 users. [SEP] sectors: waste water, digital providers relevance: non_essential ms_affected: 1 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
Configuration error in research firewall rules exposing none data to unauthorized access. [SEP] sectors: research, energy relevance: high_relevance ms_affected: 8 cross_border: none coordination: full_ipcr capacity_exceeded: true
O4
DDoS campaign targeting energy infrastructure ending in partial service degradation for 5 downstream organizations. [SEP] sectors: energy, space relevance: systemic ms_affected: 5 cross_border: none coordination: national capacity_exceeded: false
O1
Ransomware attack on postal courier provider causing significant disruption to core services affecting 5 entities across 2 sectors. [SEP] sectors: postal courier, digital providers relevance: non_essential ms_affected: 8 cross_border: none coordination: full_ipcr capacity_exceeded: true
O4
Ransomware attack on chemicals provider causing sustained disruption to core services affecting 25 entities across 5 sectors. [SEP] sectors: chemicals, research, food production, education, ict service management relevance: essential ms_affected: 8 cross_border: limited coordination: eu_active capacity_exceeded: false
O3
Brute force attack on energy authentication systems leading to sustained access disruption for 55 users. [SEP] sectors: energy relevance: non_essential ms_affected: 1 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
Bluetooth vulnerability exploited in digital providers medical devices touching 1 hospital services. [SEP] sectors: digital providers, food production relevance: non_essential ms_affected: 5 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
Mass scanning and exploitation campaign against health exposed services affecting 55 unpatched systems. [SEP] sectors: health, education relevance: non_essential ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: false
O2
DNS hijacking affecting energy domain resolution leading to sustained service impairment for 25 providers. [SEP] sectors: energy, ict service management, drinking water, transport, chemicals relevance: essential ms_affected: 8 cross_border: none coordination: national capacity_exceeded: false
O2
Power grid cyber-physical compromise on financial market SCADA causing sustained disruption with none cascading effects. [SEP] sectors: financial market, ict service management relevance: high_relevance ms_affected: 3 cross_border: limited coordination: eu_active capacity_exceeded: true
O3
Privilege escalation in chemicals active directory leading to none lateral movement across 5 network segments. [SEP] sectors: chemicals, waste water, waste management, public administration, space relevance: non_essential ms_affected: 8 cross_border: limited coordination: national capacity_exceeded: false
O2
Certificate authority compromise reaching education trust chains with cross sector cascading trust failures across 2 domains. [SEP] sectors: education, waste water relevance: systemic ms_affected: 8 cross_border: systemic coordination: eu_active capacity_exceeded: false
O4
SQL injection against waste water databases culminating in none data breach across 25 records systems. [SEP] sectors: waste water, transport, banking, health, public administration relevance: high_relevance ms_affected: 2 cross_border: none coordination: eu_info capacity_exceeded: true
O3
Deepfake-assisted social engineering targeting food production leadership with sensitive access to 5 strategic systems. [SEP] sectors: food production, digital providers relevance: systemic ms_affected: 2 cross_border: significant coordination: full_ipcr capacity_exceeded: true
O4
GPS spoofing targeting food production navigation systems causing partial operational confusion for 1 vehicles. [SEP] sectors: food production, research relevance: systemic ms_affected: 2 cross_border: limited coordination: national capacity_exceeded: true
O3
DNS hijacking affecting financial market domain resolution leading to complete service interruption for 25 organizations. [SEP] sectors: financial market, food production, chemicals, health, waste management relevance: systemic ms_affected: 1 cross_border: limited coordination: national capacity_exceeded: true
O3
SSH key compromise in financial market jump servers enabling cross sector lateral access across 2 network zones. [SEP] sectors: financial market, waste water relevance: essential ms_affected: 8 cross_border: significant coordination: full_ipcr capacity_exceeded: false
O4
Cloud misconfiguration exposing drinking water storage buckets with sensitive data of 1 customers. [SEP] sectors: drinking water relevance: high_relevance ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
SSH key compromise in financial market jump servers enabling cross sector lateral access across 2 network zones. [SEP] sectors: financial market, waste water relevance: essential ms_affected: 8 cross_border: significant coordination: full_ipcr capacity_exceeded: false
O4
Zero-day exploitation in financial market control services causing sustained operational interruption. [SEP] sectors: financial market, research relevance: non_essential ms_affected: 3 cross_border: none coordination: national capacity_exceeded: false
O1
API abuse targeting postal courier cloud services leading to significant rate limiting and outages. [SEP] sectors: postal courier relevance: high_relevance ms_affected: 2 cross_border: systemic coordination: national capacity_exceeded: false
O1
Cloud misconfiguration exposing transport storage buckets with none data of 5 customers. [SEP] sectors: transport, digital infrastructure, postal courier, public administration, financial market relevance: high_relevance ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O2
Brute force intrusion on digital infrastructure authentication platforms leading to complete access interruption for 55 users. [SEP] sectors: digital infrastructure, research relevance: systemic ms_affected: 2 cross_border: none coordination: full_ipcr capacity_exceeded: true
O4
Memory corruption exploit in drinking water SCADA systems causing complete process control degradation. [SEP] sectors: drinking water relevance: essential ms_affected: 3 cross_border: limited coordination: full_ipcr capacity_exceeded: true
O4
Insider threat at public administration facility resulting in sensitive data compromise impacting 55 connected entities. [SEP] sectors: public administration relevance: systemic ms_affected: 3 cross_border: none coordination: eu_info capacity_exceeded: false
O2
With sensitive data exfiltration, encrypted channel abuse by malware in space networks evading detection. [SEP] sectors: space, digital providers, education, waste water, banking relevance: high_relevance ms_affected: 5 cross_border: none coordination: full_ipcr capacity_exceeded: false
O4
Malicious update pushed to waste water monitoring software affecting 5 installations with limited cascading impact. [SEP] sectors: waste water relevance: systemic ms_affected: 2 cross_border: systemic coordination: national capacity_exceeded: false
O1
Data poisoning incident on waste water machine learning models with operational integrity compromise. [SEP] sectors: waste water, public administration, transport, health, chemicals relevance: non_essential ms_affected: 3 cross_border: none coordination: eu_info capacity_exceeded: true
O3
Social engineering attack on digital providers help desk leading to sensitive data access for 25 accounts. [SEP] sectors: digital providers, manufacturing relevance: non_essential ms_affected: 8 cross_border: none coordination: national capacity_exceeded: false
O1
With none cascading trust failures across 1 domains, certificate authority compromise impacting banking trust chains. [SEP] sectors: banking relevance: high_relevance ms_affected: 1 cross_border: none coordination: eu_info capacity_exceeded: true
O3
Watering hole compromise targeting health personnel websites with operational credential harvesting. [SEP] sectors: health, chemicals, banking, food production, research relevance: systemic ms_affected: 3 cross_border: limited coordination: full_ipcr capacity_exceeded: true
O4
Cloud misconfiguration exposing banking storage buckets with operational data of 12 customers. [SEP] sectors: banking, space, food production relevance: essential ms_affected: 3 cross_border: systemic coordination: national capacity_exceeded: false
O2
With significant service impact, log4j-style vulnerability in waste water java applications affecting 55 instances. [SEP] sectors: waste water relevance: high_relevance ms_affected: 8 cross_border: none coordination: national capacity_exceeded: true
O3
SSH key compromise in waste water jump servers enabling cross sector lateral access across 2 network zones. [SEP] sectors: waste water, financial market relevance: essential ms_affected: 5 cross_border: significant coordination: national capacity_exceeded: true
O3
API abuse targeting banking cloud services causing significant rate limiting and outages. [SEP] sectors: banking, digital infrastructure relevance: essential ms_affected: 5 cross_border: limited coordination: national capacity_exceeded: false
O2
Botnet infection across ict service management endpoints with complete service degradation involving 1 sites. [SEP] sectors: ict service management, banking, research, health, education relevance: systemic ms_affected: 8 cross_border: none coordination: national capacity_exceeded: false
O4
BGP route leak impacting food production network connectivity with partial disruption across 2 sectors. [SEP] sectors: food production, energy relevance: systemic ms_affected: 2 cross_border: limited coordination: national capacity_exceeded: false
O2
GPS spoofing targeting waste management navigation systems resulting in significant operational confusion for 25 vehicles. [SEP] sectors: waste management relevance: systemic ms_affected: 5 cross_border: systemic coordination: national capacity_exceeded: false
O1
OAuth token theft from food production identity providers impacting 55 federated services. [SEP] sectors: food production relevance: non_essential ms_affected: 8 cross_border: none coordination: eu_info capacity_exceeded: false
O2
OAuth token theft from education identity providers affecting 1 federated services. [SEP] sectors: education relevance: high_relevance ms_affected: 2 cross_border: significant coordination: national capacity_exceeded: true
O3
Phishing campaign against research operators with none credential theft impacting 5 entities. [SEP] sectors: research relevance: systemic ms_affected: 3 cross_border: systemic coordination: national capacity_exceeded: false
O1
API abuse directed at postal courier cloud services causing complete rate limiting and outages. [SEP] sectors: postal courier relevance: high_relevance ms_affected: 2 cross_border: systemic coordination: national capacity_exceeded: false
O1
Botnet infection across energy endpoints with complete service degradation affecting 5 sites. [SEP] sectors: energy relevance: non_essential ms_affected: 3 cross_border: none coordination: eu_info capacity_exceeded: false
O2
DDoS campaign targeting digital providers infrastructure leading in sustained service degradation for 1 downstream entities. [SEP] sectors: digital providers relevance: systemic ms_affected: 5 cross_border: none coordination: national capacity_exceeded: false
O1
Encrypted channel abuse by malware in education networks evading detection with operational data exfiltration. [SEP] sectors: education, waste management relevance: systemic ms_affected: 1 cross_border: none coordination: national capacity_exceeded: false
O1
Data poisoning attack on space machine learning models with none integrity compromise. [SEP] sectors: space, research relevance: high_relevance ms_affected: 1 cross_border: none coordination: eu_info capacity_exceeded: false
O2
Social engineering attack on waste management help desk leading to none data access for 25 accounts. [SEP] sectors: waste management, research, drinking water, public administration, education relevance: non_essential ms_affected: 2 cross_border: limited coordination: eu_info capacity_exceeded: false
O2
Data poisoning attack on waste management machine learning models with operational integrity compromise. [SEP] sectors: waste management, research relevance: high_relevance ms_affected: 1 cross_border: none coordination: eu_info capacity_exceeded: false
O2
With sustained interruption across 2 sectors, bgp route leak impacting waste water network connectivity. [SEP] sectors: waste water, energy relevance: essential ms_affected: 8 cross_border: limited coordination: eu_info capacity_exceeded: true
O3
Social engineering attack on health help desk leading to none data access for 25 accounts. [SEP] sectors: health, food production relevance: non_essential ms_affected: 8 cross_border: none coordination: national capacity_exceeded: false
O1
Firmware tampering in research IoT devices causing none cascading failures in 2 sectors. [SEP] sectors: research, postal courier relevance: systemic ms_affected: 3 cross_border: none coordination: full_ipcr capacity_exceeded: true
O4
End of preview. Expand in Data Studio

CyberScale Operational Severity Training Data

Training dataset for the CyberScale incident operational severity classifier (Phase 3 O-model). Contains 8,000 parametric incident scenarios with deterministic O1-O4 labels.

Schema

Column Type Description
text string Formatted input: <description> [SEP] sectors: <list> relevance: <level> ms_affected: <N> cross_border: <level> coordination: <level> capacity_exceeded: <bool>
label string Operational severity level (O1/O2/O3/O4)

Class Distribution

Label Count
O1 2,000
O2 2,000
O3 2,000
O4 2,000

Citation

Part of the CyberScale project — multi-phase cyber severity assessment MCP server.

Downloads last month
16