The IoC (Indicators of Compromise) , Or indicators of compromiseThese are pieces of information that can be used to identify malicious or suspicious activity in a computer system or network. These indicators are mainly used to detect intrusions, malware infections, hacking attempts or any other form of cyber attack.
👉 Types of IoC
IoCs can include a variety of specific data, such as :
- IP addresses IP addresses known to be associated with malicious activities, such as command and control (C2) servers used by attackers.
- Domains and URLs Malicious domain names or web links used to distribute malicious software or steal sensitive information.
- File hash MD5, SHA-1 or SHA-256 fingerprints (hashes) of malicious files to identify potentially dangerous programs.
- File or process names Unusual file or process names or names known to be associated with malicious software.
- Data exfiltration strategies Abnormal behaviour such as massive data transfers to unknown or unauthorised destinations.
- Changes to system configurations For example, modifying Windows registries or adding new entries to start-up scripts.
- Temporary or log files The presence of unusual temporary files or log entries that indicate suspicious activity.
- Email addresses : Email addresses used in phishing or to send malicious attachments.
- Obfuscation techniques The use of methods to hide malicious code, such as encryption or packing.
IoCs are essential for security teams because they enable :
- Quickly identify active threats in an environment.
- Respond more effectively by isolating compromised systems.
- Implement proactive measures to prevent future intrusions.
- Improve detection capabilities through continuous learning from past attacks.
However, it is important to note that IoCs generally focus on retroactive signals, i.e. they identify traces after an intrusion has taken place. For this reason, they need to be combined with other cybersecurity approaches, such as behaviour-based detection techniques (as opposed to fixed signatures), to identify advanced and evolving threats.