Indicators of Compromise
Malware samples, IP addresses and domain names are used to update firewalls and detection systems and understand threat actors’ TTPs. These are raw data but included within CTI.
Client-derived Data
Extracted from client infrastructure or SIEM/logs. Used with other sources for proactive measures like threat hunting.
Deep Web
Members-only hacking forums provide insight into tools and services requested and advertised by cybercriminals. Can include exploits and inform patch prioritisation.
Dark Web
Used to identify if credentials are present on marketplaces hosted on anonymity-focused networks like Tor or I2P. Also used to detect intent to target infrastructure.
Messaging Platforms
Used by threat actors to communicate and sell goods/services. Preferred over semi-public forums for direct engagement.
Cyber Activists Communication
Use IRC channels and messaging platforms to discuss operations, providing insight into tactics and targets.
Social Media
Used by low-capability actors to signal intent. Also used by criminals to attract customers and may reveal data leaks or insider threats.
Human Intelligence
Derived from engagement via various sources. Must be collected ethically and legally, complying with regulations like GDPR.
Malware Analysis
Extracts indicators of compromise and helps understand threat actors’ TTPs to inform network defenders.
Use of Geopolitical Developments in CTI?
Used to understand the intent of nation-state actors.
What can be derived from Paste Sites?
Reveal leaked credentials, activist operations, code snippets, and breach evidence.
Information Sharing Platforms
Provide context and insight into threat actors’ activity. Often divided by national or sectoral boundaries.