Detecting a cyber threat requires threat intelligence, and the National Cyber Security Centre (NCSC) defines this as "evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard."
These indicators, commonly referred to as Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), provide tangible evidence of a breach, such as malicious IP addresses, file hashes, or unusual network traffic patterns, and identify malicious intent and behaviors before a compromise occurs, such as lateral movement within a network or unauthorized privilege escalation.
Related: How to know if your organization has experienced a breach - Google Docs
An IOC is an indicator that helps identify potential intrusions or compromises within a network host. IOCs can reveal when an attack occurred, the tools used, and the identity of those responsible. Common examples of IOCs include:
According to NIST, IOAs are observable behaviors, patterns, or artifacts that suggest malicious activity may be underway. Unlike Indicators of Compromise (IOCs), which often identify evidence of a past attack, IOAs focus on detecting potential threats early by analyzing enemy actions, such as attempts to exploit vulnerabilities or unauthorized system access. Examples of IOAs include:
IOAs focus on identifying active events and processes in real-time, with an emphasis on understanding the attribution and intent of threat actors during an ongoing attack, IOCs are reactive indicators used after an event has occurred, providing forensic information about known enemies.
IOCs reveal critical details such as the tactics, techniques, and procedures (TTPs) used during a cyberattack, helping incident responders understand the severity of an event and where to focus mitigation efforts. IOAs enable proactive threat prevention and real-time detection, while IOCs support thorough post-incident investigation and forensic analysis.
These cybersecurity guidelines enable organizations to adopt a flexible and proactive approach to managing and mitigating cybersecurity threats:
Related: What is an IDS - Google Docs
Lateral movement refers to the techniques cybercriminals use to navigate through a compromised network to find vulnerabilities, escalate access privileges, and reach their ultimate target. It involves moving sideways from device to device within the network, often undetected, to gain deeper access and exfiltrate data.
TTPs describe the behavior of threat actors and the structured framework they use to execute cyberattacks. Tactics are the high-level strategies, techniques are the methods used to achieve the tactics, and procedures are the specific steps taken to execute the techniques.
Data exfiltration refers to the unauthorized transfer or retrieval of data from a computer or network.