Threat Intelligence Feeds

Threat Intelligence Feeds

One-liner: Continuously updated streams of IOCs, malicious IPs, domains, and file hashes shared by security vendors and organizations to enable proactive threat detection and blocking.

🎯 What Is It?

Threat Intelligence Feeds are curated, regularly updated lists of known malicious indicators (IPs, domains, URLs, file hashes, email addresses) distributed by threat intelligence providers. These feeds enable organizations to detect and prevent attacks by comparing network traffic, DNS queries, and file activity against known bad indicators.

🤔 Why It Matters

📊 Types of Threat Intelligence

Type Description Audience Use Case
Strategic High-level trends, threat landscape Executives Risk assessment, budgeting
Tactical TTPs, campaigns, threat actor behavior Security managers Detection strategy
Operational Ongoing campaigns, attacker intent SOC analysts Active threat hunting
Technical IOCs (IPs, domains, hashes) Security engineers Feed-based blocking/detection

This note focuses on Technical Intelligence (IOC-based feeds).

🔬 How It Works

Feed Consumption Workflow

1. Subscribe to threat intelligence feed
   ↓
2. Feed provider publishes new IOCs
   ↓
3. Feed consumed by security tools:
   - Firewall (IP blocking)
   - DNS Sinkhole (domain blocking)
   - Email Gateway (domain/IP blocking)
   - SIEM (IOC matching)
   - EDR (hash blocking)
   ↓
4. Tools compare traffic against IOCs
   ↓
5. Match found → Block/Alert
   ↓
6. Security team investigates alerts

Common IOC Types in Feeds

IOC Type Example Use Case
IP Address 192.0.2.100 Block Command and Control (C2) connections
Domain evil-phish.com DNS Sinkhole, Email Gateway blocking
URL http://malware.net/payload.exe Web proxy blocking
File Hash (MD5/SHA256) d41d8cd98f00b204e9800998ecf8427e Antivirus (AV), EDR blocking
Email Address attacker@evil.com Email Gateway filtering
SSL Certificate Cert thumbprint TLS inspection blocking

Free/Community Feeds

Provider Type Focus
abuse.ch Malware URLs, IPs Malware, Ransomware
AlienVault OTX Community IOCs General threats
Emerging Threats Suricata/Snort rules Network IDS/IPS
Spamhaus IP/domain blocklists Spam, phishing
PhishTank Phishing URLs Phishing
CISA Government advisories Critical infrastructure
VirusTotal File/URL reputation Malware analysis

Commercial Feeds

Provider Coverage Best For
Recorded Future Real-time, broad Enterprise SOC
Mandiant APT, targeted attacks Threat hunting
CrowdStrike Falcon Intelligence EDR integration
Anomali ThreatStream SIEM/SOAR integration
Palo Alto Unit 42 Network IOCs Firewall integration

🛡️ Threat Intelligence Consumers vs. Producers

Consumers

Organizations that use threat intelligence feeds to improve security:

Producers

Organizations that create and share threat intelligence:

Most organizations are consumers. Becoming a producer requires:

🎤 Interview Angles

Common Questions

Key Talking Points

STAR Story

Situation: SOC had no threat intelligence capability, only reactive detections after incidents occurred.
Task: Integrate threat intelligence feeds to proactively block and detect known threats.
Action: Subscribed to abuse.ch, AlienVault OTX, and Spamhaus feeds. Integrated feeds into firewall (IP blocking), DNS server (domain sinkholing), and Elastic SIEM (IOC matching). Used Uncoder.io to convert IOC lists to Elastic queries. Created ElastAlert rules for IOC hits. Configured daily feed updates via cron job.
Result: Blocked 47 malicious IPs/domains proactively in first month. Detected 3 compromised hosts via IOC matches before data exfiltration. Reduced MTTD for known threats by 65%.

✅ Best Practices

❌ Common Misconceptions

🆚 Feed Format Standards

Format Description Support
STIX/TAXII Structured format for TI sharing Enterprise tools
CSV/JSON Simple lists Easy integration
MISP Open-source TI platform Community sharing
OpenIOC XML-based IOC format Legacy

📚 References