A mixed threat attack is an attack that uses different tactics to infiltrate a computer user's environment. A mixed threat attack might include an infected file that comes in by way of spam or can be received by way of Internet download. The mixed threat attacks generally try to exploit multiple vulnerabilities to get into a system. By launching multiple diverse attacks in parallel, the attacker can exploit more entry points than with just a single attack.
Because these threats are based on multiple single-attacks, they are much harder to detect. Because firewalls can help with these types of attacks, if configured correctly, they are somewhat effective against this type of attack. However, if the attack is embedded inside an application, it is no longer able to prevent the attack. Typical techniques employed are to define the multiple access threat with a signature that can represents identification for the virus removal software. These types of techniques need to be employed on the host machine, because sometimes the firewall or Intrusion Detection System is not able to detect the attack.