Skip to content

Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community

License

facebook/threat-research

Repository files navigation

🛡️Threat Research Indicators

Resources | The Online Operations Killchain | FAQ | License

Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community

📚 Resources

  • Threat Reports: For comprehensive threat analysis, visit our Transparency Center
  • IOC & Threat Indicator Folders: Access the repository of Indicators of Compromise and threat indicators here
  • Index of tactics, techniques and procedures (TTPs) : For an index of the current TTPs here

🛠️ The Online Operations Killchain

To help the broader research community to study and protect people across different internet services, we’ve collated and organized these indicators according to the Online Operations Kill Chain framework, which we use at Meta to analyze many sorts of malicious online operations, identify the earliest opportunities to disrupt them, and share information across investigative teams. The kill chain describes the sequence of steps that threat actors go through to establish a presence across the internet, disguise their operations, engage with potential audiences, and respond to takedowns.

This section includes the latest threat indicators and is not meant to provide a full cross-internet, historic view into these operations. It’s important to note that, in our assessment, the mere sharing of these operations’ links or engaging with them by online users would be insufficient to attribute accounts to a given campaign without corroborating evidence.

❓ FAQ

Why are you releasing this?

We’re sharing these threat indicators in this format to enable further research by the open-source community into any related activity across the web. Note that we’ve been sharing threat indicators in PDF format for years as part of our regular threat reporting

How were these indicators identified?

Meta employs a diverse array of techniques to identify malware and malicious activities. We do not typically disclose our exact methods publicly.

How often are the Indicators of Compromise (IOCs) updated?

We regularly update the IOCs as part of our broader threat reporting. For further threat analysis, visit our Transparency Center

📝 License

All the data in this repository is provided under the MIT License. For the full license text, refer to the LICENSE file.

About

Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published