GitXplorerGitXplorer
f

threat-research

public
141 stars
15 forks
2 issues

Commits

List of commits on branch main.
Unverified
2942fb6c3e71f7983399e87322fc8a63def7b55f

Q2_2024 Killchain-TTPs update

TThreatResearch-Team committed a month ago
Unverified
37a7144ac7a91b5e5e5e4da03155b13045a2da78

uploading full file for q2_2023

TThreatResearch-Team committed a month ago
Unverified
a187b75459806179a19a420e85767cea3827c23a

Q2_2024

TThreatResearch-Team committed a month ago
Unverified
ac9f05c5f50646f3b35db23f5cde5775a2b6eb64

Q2_2024

TThreatResearch-Team committed a month ago
Unverified
94e6f593fc28d1f72870e8166f8ec6f23b39106d

Q1_2024 ATR

TThreatResearch-Team committed 4 months ago
Unverified
f0685aa995dfce8204d4f73d268aecd3ead6fb47

Feb_2024 update

TThreatResearch-Team committed 7 months ago

README

The README file for this repository.

🛡️Threat Research Indicators

Resources | The Online Operations Killchain | FAQ | License

Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community

📚 Resources

  • Threat Reports: For comprehensive threat analysis, visit our Transparency Center
  • IOC & Threat Indicator Folders: Access the repository of Indicators of Compromise and threat indicators here
  • Index of tactics, techniques and procedures (TTPs) : For an index of the current TTPs here

🛠️ The Online Operations Killchain

To help the broader research community to study and protect people across different internet services, we’ve collated and organized these indicators according to the Online Operations Kill Chain framework, which we use at Meta to analyze many sorts of malicious online operations, identify the earliest opportunities to disrupt them, and share information across investigative teams. The kill chain describes the sequence of steps that threat actors go through to establish a presence across the internet, disguise their operations, engage with potential audiences, and respond to takedowns.

This section includes the latest threat indicators and is not meant to provide a full cross-internet, historic view into these operations. It’s important to note that, in our assessment, the mere sharing of these operations’ links or engaging with them by online users would be insufficient to attribute accounts to a given campaign without corroborating evidence.

❓ FAQ

Why are you releasing this?

We’re sharing these threat indicators in this format to enable further research by the open-source community into any related activity across the web. Note that we’ve been sharing threat indicators in PDF format for years as part of our regular threat reporting

How were these indicators identified?

Meta employs a diverse array of techniques to identify malware and malicious activities. We do not typically disclose our exact methods publicly.

How often are the Indicators of Compromise (IOCs) updated?

We regularly update the IOCs as part of our broader threat reporting. For further threat analysis, visit our Transparency Center

📝 License

All the data in this repository is provided under the MIT License. For the full license text, refer to the LICENSE file.