From Indicators of Compromise (IOCs) to TTPs: Decoding Cyber Threat Intelligence Lingo

Summary:

In the world of cybersecurity and fraud prevention, understanding the lingo is crucial. Terms like IOCs, TTPs, and various abriviions represent the building blocks of modern threat intelligence.

Details:

In the world of cybersecurity and fraud prevention, understanding the lingo is crucial. Terms like IOCs, TTPs, and various abriviions represent the building blocks of modern threat intelligence. IOCs (Indicators of Compromise) are the tell-tale signs that an attack has occurred—think IP addresses or malicious file signatures. Meanwhile, TTPs (Tactics, Techniques, and Procedures) offer a deeper look into how attackers operate, detailing their behaviors and strategies. To truly decode today’s threats, you need to understand the terminology behind common fraud tactics, such as FTID, DNA, and BEC, which are wreaking havoc across industries. Below we break down these terms and why they matter

Key Fraud Techniques and Their Impact


FTID (Fake Tracking ID)

Fake Tracking ID  is a deceptive tactic in which a fraudster manipulates shipping information to create the illusion that an item was delivered. Often paired with the practice of "boxing," where an empty or incorrect item is sent, the fraudster tricks the merchant into believing the delivery was completed. This scam not only results in financial loss for the business but also erodes trust in the shipping and return process.



DNA (Did Not Arrive)

Did Not Arrive fraud occurs when a customer falsely claims that an ordered item never arrived, despite it being delivered. This common scam exploits weaknesses in delivery tracking or lenient return policies, forcing companies to issue refunds or replacements for goods that were never lost. DNA fraud can severely impact e-commerce businesses, especially those with high shipping volumes.



BEC (Business Email Compromise)

Business Email Compromise is a sophisticated fraud scheme where attackers use compromised or spoofed email accounts to trick employees into authorizing fraudulent wire transfers or paying fake invoices. By impersonating executives or trusted vendors, cybercriminals manipulate internal processes, causing significant financial damage before the fraud is even detected.



Conclusion

Understanding the language of cyber threat intelligence is critical for identifying and defending against modern cyber and fraud schemes. By knowing the difference between IOCs and TTPs, and recognizing fraudulent tactics like FTID, DNA, and BEC, organizations can build more robust defenses against the ever-evolving threat landscape.