ELI5: What are Indicators of Compromise?

After a burglar breaks into a house, they leave clues behind — a broken window, muddy footprints, things moved around. Indicators of compromise are the digital clues that tell you a computer or network has been broken into. Maybe there are strange files that shouldn’t be there, or a program is running at 3 AM when nobody’s working. Security teams look for these clues the same way detectives look for evidence, so they can figure out what happened and stop it from getting worse.

Overview

Indicators of Compromise (IoCs) are pieces of forensic evidence — such as file hashes, IP addresses, domain names, or behavioral patterns — that suggest a system or network has been compromised. IoCs are used by security tools and analysts to detect, investigate, and respond to security incidents. They represent the “breadcrumbs” left behind by attackers and are critical for threat detection and intelligence sharing.

Key Concepts

  • File-based indicators: Malicious file hashes (MD5, SHA-256), suspicious file names, unexpected file locations
  • Network-based indicators: Known malicious IP addresses, suspicious domains, unusual outbound connections, C2 (command and control) traffic patterns
  • Host-based indicators: Unexpected processes, registry changes, scheduled tasks, unauthorized user accounts, modified system files
  • Behavioral indicators: Unusual login times, impossible travel (logins from distant locations in short timeframes), lateral movement patterns
  • Email indicators: Phishing sender addresses, malicious attachment hashes, suspicious URLs in email bodies
  • Account indicators: Multiple failed logins, privilege escalation attempts, account lockouts, new admin accounts
  • Indicators of Attack (IoA): Proactive behavioral signals suggesting an attack is in progress (more real-time than IoCs)
  • TAXII: Standards for formatting (STIX) and sharing (TAXII) IoC data between organizations
  • Threat feeds: Automated IoC data streams from commercial and open-source providers
  • False positives: Legitimate activity that matches IoC patterns — tuning is essential

Exam Tips

Remember

IoCs = evidence of past compromise (reactive). IoAs = signs of active attack (proactive). Common IoCs: unexpected outbound traffic, unusual process execution, beaconing (regular interval C2 communication), new accounts.

  • Beaconing (regular interval outbound connections) is a classic C2 indicator
  • Data exfiltration indicators: large outbound transfers, DNS tunneling, encrypted traffic to unusual destinations
  • IoCs have a shelf life — sophisticated attackers change infrastructure frequently

Connections

  • Fed into siem to create correlation rules and automated detection alerts
  • Drives the detection phase of incident-response by identifying potential security events
  • threat-intelligence provides IoCs from external sources to enhance organizational detection
  • May reveal specific malware-types through file hashes and behavioral patterns

Practice Questions

Scenario

See case-indicators-of-compromise for a practical DevOps scenario applying these concepts.