Infoblox's Threat Intelligence Group (TIG) detects, curates, and publishes threat intelligence data pertaining to relevant cyber campaigns. TIG is sharing indicators of compromise (IOCs) related to threats that are of high interest to the cyber security community through this public repository. The following contains descriptions about the contents of each dataset (i.e data folder). All files are csv formatted and MISP compatible.
This material is being provided by Infoblox under the Creative Commons CC BY 4.0 license. This license allows you to share and adapt the material, in particular to use it for both commercial and non-commercial security purposes, under the terms of: attribution to Infoblox and the license. For more details, see the LICENSE file in our repo or visit https://creativecommons.org/licenses/by/4.0/
This folder contains IOCs related to the Russian invasion of Ukraine. The majority of the content is based on Infoblox internal analytics and validation analysis, though some OSINT is also included. Our references should clearly indicate indicators that originated in OSINT.
The file ukraine_russia_malicous_suspicious_iocs.csv
contains malicious and suspicious IOCs that can cause harm to
businesses and innocent users. Infoblox recommends blocking traffic from network indicators described in this file.
The ukraine_russia_legitimate_iocs.csv
file contains confirmed indicators that,
at the time of review, were not evidently associated with malicious activity. The related websites did not show indications
of hosted malware or fraudulent behavior, but may host content that is not wanted by some users.
This includes domains belonging to well-known donation sites providing support to Ukrainian civilians, or newly
created support programs operated by entities positively acknowledged by the online community. Many of these are
blocked by other vendors due to their new registration or other automated analytics.
This folder contains IOCs related to the earthquake that struck Türkiye and parts of Syria in early February, 2023. The majority of the content is based on Infoblox internal analytics and validation analysis, though some OSINT is also included. Our references should clearly indicate indicators that originated in OSINT.
The file turkiye_earthquake_malicious_suspicious_iocs.csv
contains malicious and suspicious IOCs that can cause harm to
businesses and innocent users. Infoblox recommends blocking traffic from network indicators described in this file.
The turkiye_earthquake_legitimate_iocs.csv
file contains confirmed indicators that,
at the time of review, were not evidently associated with malicious activity. The related websites did not show indications
of hosted malware or fraudulent behavior, but may host content that is not wanted by some users.
This includes domains belonging to well-known donation sites providing support to Turkish civilians, or newly
created support programs operated by entities positively acknowledged by the online community. Many of these are
blocked by other vendors due to their new registration or other automated analytics.
This folder contains IOCs and artifacts related to our whitepaper Decoy Dog is No Ordinary Pupy. A detailed overview of the files can be found in the Readme
This folder contains IOCs related to our Cyber Campaign Briefs (ccb)
This folder contains IOCs related to our Cyber Threat Advisories (cta)
Field | Description |
---|---|
type | The data type of the IOC. Possible options: domain, ip, url, sha256, and email. |
indicator | Also known as an IOC, this analysis artifact is a piece of forensic data related to online activities regarding the Russia-Ukraine conflict. |
classification | Descriptive labels that explain the nature of the IOC. |
references | A web resource link that provides information related to the indicator and may have been a decision factor for the classification label. |
The indicators in this repo include those relevant to our publications on the threat environment.
"Ukraine War" Malspam Delivers Remcos RAT
Ukraine Themed Malspam Delivers Agent Tesla
Scammers First on the Scene for Türkiye's “Disaster of the Century”
Infoblox customers can find additional detailed information about the decision criteria for a given indicator in the notes
field within the Threat Intelligence Data Exchange (TIDE) database.