Can IOCs Impose Cost? The Effects of Publishing Threat Intelligence on Adversary Behavior

Conference Paper (2025)
Author(s)

X.B. Bouwman (TU Delft - Organisation & Governance)

A.M. Ethembabaoglu (TU Delft - Organisation & Governance)

B. Hermans (TU Delft - Cyber Security)

C. Hernandez Ganan (TU Delft - Organisation & Governance)

M.J.G. van Eeten (TU Delft - Organisation & Governance)

Research Group
Organisation & Governance
DOI related publication
https://doi.org/10.1145/3719027.3765026
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Organisation & Governance
Pages (from-to)
663-677
Publisher
ACM
ISBN (electronic)
79-8-4007-1525-9
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Exposing intrusion campaigns has become a geopolitical tool, with governments and commercial firms publishing threat intelligence reports about hacking attempts and modus operandi. U.S. government officials have explained this as not just a defensive practice but also as a way to ‘impose cost’ on attackers by forcing them to develop new infrastructure, tools, and techniques, consuming their scarce resources. We empirically examine this claim by analyzing attacker behavior before and after the publication of indicators of compromise (IOCs). Using IOC feeds from two leading commercial providers – deemed to best enable detection of sophisticated threats – we matched IOCs against a large dataset of real-world network traffic metadata. This enabled us to generate sightings retroactively, capturing malicious activity up to 150 days before and after publication. Unlike prior work focused on post-publication malicious activity, our method provides a more complete view over time. Our results show that most IOCs point to resources that attackers had already abandoned by the time of IOC publication, limiting their utility for detecting ongoing attacks and undermining the idea of ‘imposing costs’. Statistical modeling further reveals that publication status has low explanatory power for sightings, suggesting that confounding variables exist. We also observed a 30-day delay between the peak of threat actor activity and IOC publication for one provider. This study is the first empirical assessment linking threat intelligence publication to attacker behavior, bridging computer science and international relations.