{"id":10937,"date":"2025-01-14T11:55:40","date_gmt":"2025-01-14T11:55:40","guid":{"rendered":"\/cybersecurity-blog\/?p=10937"},"modified":"2025-01-17T13:19:17","modified_gmt":"2025-01-17T13:19:17","slug":"threat-intelligence-pivoting","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/","title":{"rendered":"Threat Intelligence Pivoting: Actionable Insights Behind Indicators"},"content":{"rendered":"\n<p>Pivoting in cyber threat intelligence refers to using one piece of data to find and explore related information and expand your understanding of a threat. It lets you discover hidden connections between indicators of compromise and find potential vulnerabilities before they are exploited.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why pivoting matters&nbsp;<\/h2>\n\n\n\n<p>Cyber threat intelligence concentrates on indicators of compromise, <a href=\"https:\/\/any.run\/cybersecurity-blog\/malconf-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>. These are data points or artifacts (like IP addresses, domain names, file hashes, email addresses, etc.) that indicate a potential or actual malicious activity. Pivoting is researching links and correlations between IOCs and thus discovering new IOCs relevant to the same attack, malware, or threat agent. &nbsp;<br>&nbsp;<br>Pivoting helps make CTI proactive, helps predict and prevent the unfolding of an attack or the emergence of new threats.&nbsp;<br>&nbsp;<br>Threat intelligence and pivoting are critical for <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-for-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">businesses and corporate security<\/a> because they enhance an organization&#8217;s ability to anticipate, detect, and respond to cyber threats. By leveraging actionable insights from threat intelligence and pivoting to discover deeper connections, businesses can protect their assets, reduce risk, and strengthen overall cybersecurity posture.&nbsp;<\/p>\n\n\n\n<p>Note that the definition of pivoting in threat intelligence is different to that in cyber security. Generally, it\u2019s a popular term used in many other fields.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>In CS the term is usually used by pentesters and hackers. Here pivoting <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/pivot\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">is<\/a> <em>the act of an attacker moving from one compromised system to one or more other systems within the same or other organizations. Pivoting is fundamental to the success of advanced persistent threat (APT) attacks.&nbsp;<\/em>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How it works&nbsp;<\/h2>\n\n\n\n<p>Pivoting for CTI shows its potential when IOCs are viewed not as \u201catomic\u201d but rather as complex objects. Taken by themselves, they are, so to say, \u201cbackward-looking\u201d, they lack context. IOCs are good forensic material, but not enough for predictive, proactive security effort.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Pivoting focuses on behaviors. Indicators are linked through their behavioral commonalities. This approach grasps IOC relationships, helps discover new ones, predict their behavior, generalize tendencies, and eventually build strong and adaptive defense based on the understanding of adversaries.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pivoting routine&nbsp;<\/h2>\n\n\n\n<p>Pivoting is not just about techniques and tools; it is rather about a certain approach or dare say a certain mindset. Once adopted, it\u2019ll give your threat intelligence a new depth and perspective.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>The most basic algorithm is: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Select an initial indicator. For example, a suspicious IP. Or a domain name associated with a known threat or attack.&nbsp;<\/li>\n\n\n\n<li>Analyze the indicator with a tool of your choice.&nbsp;<\/li>\n\n\n\n<li>Decompose the indicator. Understand its parameters. Define which of them could signal malicious behavior or be linked to other artifacts.&nbsp;<\/li>\n\n\n\n<li>Find and analyze linked artifacts. Pay attention to those that haven\u2019t been yet connected with a threat or an attack.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Research the discovered data.&nbsp;<\/li>\n\n\n\n<li>Draw actionable insights.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Where to start&nbsp;&nbsp;<\/h2>\n\n\n\n<p>You can start with network indicators pivoting.\u00a0 Basic network IOCs are IPs, domains, SSL\/TSL certificates. They all have certain parameters: for example, registrar and registrant for domains, hosting provider or server type for an IP address, issue date or issuer for a certificate.\u00a0<br>\u00a0<br>One of the most powerful tools for IOC research is <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Threat Intelligence Lookup<\/a>. It lets you search threat artifacts with over <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-search-parameters\/\" target=\"_blank\" rel=\"noreferrer noopener\">40 search parameters<\/a>, including <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA<\/a> and <a href=\"https:\/\/any.run\/cybersecurity-blog\/suricata-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata<\/a> rules, combine them and get <a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-lookup-notifications\/\" target=\"_blank\" rel=\"noreferrer noopener\">real-time updates<\/a> on search results.\u00a0\u00a0<\/p>\n\n\n\n<p>TI lookup is integrated with the <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> used for researching malware in action within a safe virtual environment.&nbsp; &nbsp;<br>&nbsp;<br>For example, let us try using ASN to identify network infrastructure. &nbsp;<br>&nbsp;<br>1. Find IPs assigned to the &#8220;Autonomous System of Iranian Research Organization for Science and Technology&#8221; using TI Lookup. The search query is: &nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-220\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"220\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522destinationIpAsn:%255C%2522iranian%2520research%2520organization%2520for%2520science%2520&amp;%2520technology%255C%2522%2520%2522,%2522dateRange%2522:180%7D\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522destinationIpAsn:%255C%2522iranian%2520research%2520organization%2520for%2520science%2520&amp;%2520technology%255C%2522%2520%2522,%2522dateRange%2522:180%7D\" data-link-text=\"destinationIpAsn:&quot;iranian research organization for science &amp; technology&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">destinationIpAsn:&quot;iranian research organization for science &amp; technology&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-220'>\ntable#wpdtSimpleTable-220{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-220 td, table.wpdtSimpleTable220 th { white-space: normal !important; }\n<\/style>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-1024x575.png\" alt=\"\" class=\"wp-image-10942\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-1024x575.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-768x431.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-1536x863.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-2048x1150.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image-740x416.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The results for ANS search<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>2. Look at the list of IP addresses in the search results. Some of them have tags assigned to them. The tag \u201cStormkitty\u201d refers to the eponymous stealer \u2014 StormKitty.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry <span class=\"highlight\">TI Lookup for Pivoting<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=ti_pivoting&#038;utm_term=140125&#038;utm_content=linktotiplans\" rel=\"noopener\" target=\"_blank\">\nGet 50 free requests\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Hover over the tagged IP and click the magnifying glass that appears next to it. This will include the IP address in the search request.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"570\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-1024x570.png\" alt=\"\" class=\"wp-image-10943\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-1024x570.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-768x427.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-1536x855.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2-740x412.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image2.png 1731w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>IP addresses associated with the network<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The request now is:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-221\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"221\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522destinationIpAsn:%255C%2522iranian%2520research%2520organization%2520for%2520science%2520&amp;%2520technology%255C%2522%2520and%2520destinationIP:%255C%252262.60.226.26%255C%2522%2522,%2522dateRange%2522:180%7D\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522destinationIpAsn:%255C%2522iranian%2520research%2520organization%2520for%2520science%2520&amp;%2520technology%255C%2522%2520and%2520destinationIP:%255C%252262.60.226.26%255C%2522%2522,%2522dateRange%2522:180%7D\" data-link-text=\"destinationIpAsn:&quot;iranian research organization for science &amp; technology&quot; AND destinationIP:&quot;62.60.226.26&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">destinationIpAsn:&quot;iranian research organization for science &amp; technology&quot; AND destinationIP:&quot;62.60.226.26&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-221'>\ntable#wpdtSimpleTable-221{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-221 td, table.wpdtSimpleTable221 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>3. In the search results we see a number of events linked to the IP address and associated with the activity of <a href=\"https:\/\/any.run\/malware-trends\/asyncrat\" target=\"_blank\" rel=\"noreferrer noopener\">AsyncRAT<\/a>, a well-known multifunctional malware.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-1024x566.png\" alt=\"\" class=\"wp-image-10944\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-1024x566.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-1536x849.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-2048x1132.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image3-740x409.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Network events with malicious activity<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>4. By clicking the Tasks tab (under the search query) open a list of Interactive Sandbox sessions that featured the IP address and AsyncRAT malware.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-1024x505.png\" alt=\"\" class=\"wp-image-10945\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-1024x505.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-300x148.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-768x379.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-1536x757.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-2048x1010.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-370x182.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-270x133.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image4-740x365.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malware research sessions run by users of ANY.RUN Sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>5. <a href=\"https:\/\/app.any.run\/tasks\/f76bdb85-9b9f-4a57-bfb5-7ef098b6be8a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Select one of the sessions<\/a>. Click the IOC button to the right of the virtual machine\u2019s screen.&nbsp; A collection of indicators involved in the attack contains more IP addresses marked as malicious. Any of them can be copied and subjected to research via TI Lookup.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"460\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-1024x460.png\" alt=\"\" class=\"wp-image-10947\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-1024x460.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-300x135.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-768x345.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-1536x690.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-2048x920.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-370x166.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-270x121.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image5-1-740x333.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>More food for thought from Interactive Sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Boosting cybersecurity with TI pivoting&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s look at another example and see how pivoting results in action for strengthening your network protection.&nbsp;&nbsp;<\/p>\n\n\n\n<p>1. Use a suspicious URL address saaadnesss[.]shop as a search request in TI Lookup. Instantly find out that the domain is associated with the notorious <a href=\"https:\/\/any.run\/malware-trends\/lumma\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma stealer<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"357\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-1024x357.png\" alt=\"\" class=\"wp-image-10949\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-1024x357.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-300x105.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-768x268.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-1536x536.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-2048x714.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-370x129.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-270x94.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image6-1-740x258.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Search by the URL parameter<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>2. Check whether the \u201c.shop\u201d zone domain names tend to be linked to Lumma. The search query is:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-222\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"222\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522domainName:%255C%2522.shop%255C%2522%2522,%2522dateRange%2522:180%7D\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522domainName:%255C%2522.shop%255C%2522%2522,%2522dateRange%2522:180%7D\" data-link-text=\"domainName:&quot;.shop&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">domainName:&quot;.shop&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-222'>\ntable#wpdtSimpleTable-222{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-222 td, table.wpdtSimpleTable222 th { white-space: normal !important; }\n<\/style>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"437\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-1024x437.png\" alt=\"\" class=\"wp-image-10951\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-1024x437.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-300x128.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-768x328.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-1536x656.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-2048x875.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-370x158.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-270x115.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image7-1-740x316.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>URLs and IPs linked to Lumma stealer<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We see that Lumma massively employs .shop domains. We can update our security system to recognize them as a potential threat and give an alert in case they emerge. \u00a0<br>\u00a0<br>To get the list of malicious .shop domains filled automatically based on real-time search results, subscribe to the results of the search request by clicking a bell in the top-right corner:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-223\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"223\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#{%22query%22:%22domainName:%5C%22.shop%5C%22%20AND%20threatName:%5C%22lumma%5C%22%22,%22dateRange%22:180}\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolookup#{%22query%22:%22domainName:%5C%22.shop%5C%22%20AND%20threatName:%5C%22lumma%5C%22%22,%22dateRange%22:180}\" data-link-text=\"domainName:&quot;.shop&quot; AND threatName:&quot;lumma&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">domainName:&quot;.shop&quot; AND threatName:&quot;lumma&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-223'>\ntable#wpdtSimpleTable-223{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-223 td, table.wpdtSimpleTable223 th { white-space: normal !important; }\n<\/style>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-1024x586.png\" alt=\"\" class=\"wp-image-10953\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-768x439.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-1536x878.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-2048x1171.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/image8-1-740x423.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Subscribe to the search results and get fresh updates on IOCs<\/em><\/figcaption><\/figure><\/div>\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Enrich your threat knowledge with TI Lookup\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to Track Emerging Cyber Threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nCheck out expert guide to collecting intelligence on emerging threats with <span class=\"highlight\">TI Lookup<\/span>\n\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/emerging-threats\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">How TI Lookup can help businesses<\/h2>\n\n\n\n<p>TI Lookup offers a lot of benefits that align with businesses&#8217; priorities, helping them strengthen overall security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhances Risk Management<\/strong>: TI Lookup helps businesses identify and manage risks more effectively, enabling leaders to prioritize security investments and mitigate potential threats.<\/li>\n\n\n\n<li><strong>Improves Security Team Operations<\/strong>: By offering a user-friendly interface for collecting and analyzing threat intelligence, TI Lookup simplifies the process for security teams. This allows them to gather and act on critical information more efficiently.<\/li>\n\n\n\n<li><strong>Optimizes Resource Allocation<\/strong>: By reducing false alarms and speeding up threat investigations, TI Lookup allows security teams to focus on genuine threats.<\/li>\n\n\n\n<li><strong>Supports Compliance<\/strong>: With detailed threat intelligence, TI Lookup aids businesses in meeting industry regulations and compliance standards.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>Pivoting is particularly valuable for corporate security teams because it helps uncover the &#8220;big picture&#8221; behind isolated security events. It reveals attackers\u2019 infrastructure, such as related IP addresses, malware families, or phishing campaigns. It also speeds up threat investigation, enhances threat actor profiling and enables holistic defense, preventing organizations from addressing only part of the problem while leaving other vulnerabilities exposed.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=ti_pivoting&amp;utm_term=140125&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pivoting in cyber threat intelligence refers to using one piece of data to find and explore related information and expand your understanding of a threat. It lets you discover hidden connections between indicators of compromise and find potential vulnerabilities before they are exploited.&nbsp;&nbsp; Why pivoting matters&nbsp; Cyber threat intelligence concentrates on indicators of compromise, IOCs. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10966,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,58,15],"class_list":["post-10937","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-cybersecurity-training","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Intelligence Pivoting: Actionable Insights Behind Indicators - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Learn about pivoting in threat intelligence and see how it can help you collect actionable insights on active cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Threat Intelligence Pivoting: Actionable Insights Behind Indicators\",\"datePublished\":\"2025-01-14T11:55:40+00:00\",\"dateModified\":\"2025-01-17T13:19:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\"},\"wordCount\":1266,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"cybersecurity training\",\"malware\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\",\"name\":\"Threat Intelligence Pivoting: Actionable Insights Behind Indicators - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-01-14T11:55:40+00:00\",\"dateModified\":\"2025-01-17T13:19:17+00:00\",\"description\":\"Learn about pivoting in threat intelligence and see how it can help you collect actionable insights on active cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat Intelligence Pivoting: Actionable Insights Behind Indicators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Intelligence Pivoting: Actionable Insights Behind Indicators - ANY.RUN&#039;s Cybersecurity Blog","description":"Learn about pivoting in threat intelligence and see how it can help you collect actionable insights on active cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Threat Intelligence Pivoting: Actionable Insights Behind Indicators","datePublished":"2025-01-14T11:55:40+00:00","dateModified":"2025-01-17T13:19:17+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/"},"wordCount":1266,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","cybersecurity training","malware"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/","url":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/","name":"Threat Intelligence Pivoting: Actionable Insights Behind Indicators - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-01-14T11:55:40+00:00","dateModified":"2025-01-17T13:19:17+00:00","description":"Learn about pivoting in threat intelligence and see how it can help you collect actionable insights on active cyber threats.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-pivoting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Threat Intelligence Pivoting: Actionable Insights Behind Indicators"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10937"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=10937"}],"version-history":[{"count":32,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10937\/revisions"}],"predecessor-version":[{"id":11076,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/10937\/revisions\/11076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/10966"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=10937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=10937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=10937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}