Indicators of Attack
Indicators of Attack are signs or signals that suggest a cyberattack is currently in progress or being attempted against a system or network. Unlike artifacts that confirm a breach has already occurred, IOAs focus on behaviors and activities observed before or during an attack. Identifying them enables defenders to detect and respond to threats while they are unfolding rather than after the fact.
An Indicator of Attack (IOA) is a behavioral or activity-based digital artifact that signals the likely presence of an adversary actively executing or preparing to execute a cyberattack. IOAs are distinguished from Indicators of Compromise (IOCs) in that they are active in nature, focusing on the tactics, techniques, and behaviors a threat actor exhibits prior to or during an intrusion, rather than on static post-compromise forensic evidence. IOAs typically manifest as observable telemetry patterns in endpoint, network, or log data that correlate with known adversary behaviors, and are used in threat hunting and real-time detection to identify attacks that may evade signature-based controls. Because IOAs are behavior-oriented, they may provide detection coverage against novel or unknown threats where static IOCs are absent, though their effectiveness depends on the fidelity of telemetry collection and the accuracy of behavioral baselines against which anomalies are measured.
Why it matters
Detection strategies that rely solely on known artifacts, such as malware hashes or previously documented IP addresses, are inherently reactive. By the time a static Indicator of Compromise is identified and distributed, an attacker may have already achieved their objective. Indicators of Attack shift this dynamic by focusing on adversary behavior as it unfolds, giving defenders an opportunity to interrupt an intrusion while it is still in progress rather than conducting post-breach remediation.
Who it's relevant to
Inside IOA
Common questions
Answers to the questions practitioners most commonly ask about IOA.