Cyber Threat Intelligence

VirusTotal IOC DNS Rules

Understanding the `virustota-ioc.rules`

The `virustota-ioc.rules` file is a core component of your network's defense, allowing you to actively protect against known threats. This is a practical application of Cyber Threat Intelligence (CTI), which involves gathering and analyzing information about potential or current threats to improve an organization's security posture. The complete ruleset is available on GitHub: View Rules on GitHub.

What Are the Rules and What Do They Achieve?

Each rule in the file acts as an Indicator of Compromise (IoC), a forensic artifact that indicates a network intrusion has occurred. By integrating these rules into Suricata, your system can automatically detect and alert on attempts to communicate with known malicious domains.

Examples from the ruleset:

My main objective is to use this system to transform a basic home network into a self-defending environment. By leveraging public CTI sources, my project can proactively identify and alert on threats that might otherwise go unnoticed. This not only enhances security but also provides valuable insights into the network's traffic and host behavior.

Example DNS Queries from Our Database

The data in this table is an example of DNS queries logged by the system. The threat levels are derived from automated checks against the VirusTotal API, and the results are stored in a centralized MySQL database. This process allows for real-time threat intelligence analysis directly from the collected network data.

URL Scan Date Positives / Total Scans Permalink
consent-pref.trustarc.com 2025-09-05T11:38:28 1 / 92 Link to Report
google-ohttp-relay-safebrowsing.fastly-edge.com 2025-09-05T17:32:01 2 / 92 Link to Report
prod.detectportal.prod.cloudops.mozgcp.net 2025-09-06T02:49:29 1 / 92 Link to Report
storage.googleapis.com 2025-09-06T10:28:14 1 / 92 Link to Report
ipv4-c021-waw002-orangepl-isp.1.oca.nflxvideo.net 2025-09-07T11:47:28 1 / 92 Link to Report