Hacking Humans

Indicators of Compromise (noun) [Word Notes]

Jan 27, 2026
Clear definition of digital traces that show a system or network was breached. A look at early IOC practices like IPs and hashes and why they often failed. How MITRE ATT&CK and TTPs improved prediction by focusing on attacker behavior. An analogy using Sherlock demonstrates how multiple clues combine to reveal the true pattern.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

From Ephemeral Artifacts To Behavior-Based Indicators

  • Indicators of compromise evolved from brittle artifact lists to behavior-based TTPs using frameworks like MITRE ATT&CK.
  • TTPs tie indicators to adversary behavior, making detection and forecasting of compromises more reliable.
INSIGHT

Static IOCs Produce False Positives

  • Early IOCs were static items like malicious IPs, URLs, and hashes that produced many false positives.
  • Their transience made them ineffective once attackers altered those artifacts.
INSIGHT

TTPs Raise Confidence In Attribution

  • MITRE ATT&CK introduced TTPs that capture tactics, techniques, and procedures tied to adversary groups.
  • Observing multiple TTPs from a group's playbook raises confidence the network has been compromised by that group.
Get the Snipd Podcast app to discover more snips from this episode
Get the app