Aggregation, not generation
Vendors resell third-party feeds · the same IOCs sold to hundreds of customers. Defensive competitive advantage: zero.
The Fortgale CTI feed is born from three converging sources: incidents handled by Fortgale's SOC and MDR services, active research on threat actors and criminal infrastructure, continuous analysis of offensive tools — Cobalt Strike (configurations and watermarks), infostealers, phishing kits, worms, APT tooling. Over 180 tools and actors tracked, indicators distributed via STIX/TAXII, REST API, and webhook, native integration with SIEM, EDR, firewall, IDS/IPS.
Most CTI vendors resell feeds aggregated from third-party sources (VirusTotal, Mandiant, Recorded Future). The added value is minimal, the same feed is sold to hundreds of customers simultaneously, and IOCs arrive after the attack is public.
Vendors resell third-party feeds · the same IOCs sold to hundreds of customers. Defensive competitive advantage: zero.
IOCs enter the feeds after the attack becomes public. They confirm the incident, not prevent it.
Massive feeds without context · overloaded SOC · alert fatigue · automatic blocking controls often disabled because of too much noise.
The difference is not one of "catalogue quality" — it is one of source. A feed generated from real incidents has context, timeliness, and accuracy that an aggregated feed cannot structurally have.
A documentable technical pipeline that carries an artefact observed in a real incident all the way to an active rule in the customer's SIEM/EDR. Every step has verifiable outputs and measurable times.
Every incident handled by Fortgale's SOC, MDR and Incident Response services produces artefacts: IPs observed as C2, delivery domains, hashes of executed payloads, malicious URLs, YARA rules for analysed samples. Real indicators, not simulated in an isolated sandbox.
The CTI team conducts proactive research: deep & dark web hunting, OSINT on criminal forums, Telegram channel monitoring, registrar tracking, ASN profiling, certificate transparency log analysis. Infrastructures are identified before being activated against customers.
Continuous analysis of Cobalt Strike (configuration parsing, watermarks, malleable profile), Sliver · Brute Ratel · Havoc · Mythic, infostealers (Lumma · RedLine · Vidar · StealC), phishing kits (Tycoon 2FA · EvilProxy · W3LL), worms (Raspberry Robin), loaders and APT group tooling.
Each indicator receives a confidence score (high / medium / low) and a TTL (time-to-live) based on the actor's typical rotation. Automatic distribution via STIX/TAXII 2.1, REST API, webhook directly into the customer's security platforms. No delays from manual pipelines.
The Fortgale feed covers five main families of offensive tooling. For each, a specific tracking methodology and distinctive indicators.
Command & Control frameworks are the operational heart of almost every modern intrusion. Fortgale continuously tracks configurations, watermarks, certificate fingerprints, malleable profiles, and TLS signatures of the main C2 frameworks — both leaked commercial ones (Cobalt Strike, Brute Ratel) and open-source (Sliver, Havoc, Mythic).
Infostealers are the main source of stolen credentials in criminal marketplaces and the most frequent gateway to ransomware intrusions. Fortgale tracks campaigns, C2 panels, build versions, configurations, and distribution infrastructure.
Modern AiTM phishing kits bypass MFA, intercept session cookies, and replicate Microsoft / Google flows. Fortgale tracks kits, delivery infrastructure, admin panels, and operators.
Worms, loaders, and Initial Access Broker tooling are the preferred entry vector for top ransomware groups (RansomHub, Akira, LockBit). Tracking them is equivalent to seeing an intrusion 7-30 days before it becomes ransomware.
Tooling developed by or for state APT groups: custom backdoors, signed RATs, advanced persistence kits, lateral movement frameworks. Fortgale tracks the technical artefacts when observed in real incidents or published by the CERT/research community.
An excerpt of the 180+ tools and actors the CTI team tracks: from the most widespread C2 framework (Cobalt Strike) to the dominant infostealer of 2024-2026 (Lumma), from the most used AiTM kit in Europe (Tycoon 2FA) to the Initial Access Broker fuelling top ransomware (Raspberry Robin).
The most tracked C2 framework in the world. Fortgale automatically parses Beacon configurations extracted from real samples and from internet scans (Shodan-style), tracks watermarks of leaked versions, fingerprints TLS of team servers, malleable C2 profile patterns. Indicator turnover: 100-500 new servers tracked / week.
The dominant infostealer of 2024-2026. Distributed as MaaS via Telegram, with known builders and C2 panels. Fortgale tracks C2 panel hostname rotation, build ID series, seller Telegram channels, delivery URL patterns (ClickFix, SEO poisoning, malvertising).
Premier AiTM kit bypassing MFA on Microsoft 365 and Google Workspace. Tracking of landing page signatures, Cloudflare worker abuse for delivery, redirect chains via legitimate services (Google, YouTube), session cookie exfiltration patterns.
Open-source alternative to Cobalt Strike growing strongly through 2024-2026 as criminal tooling. Fortgale tracks implant configuration, default certificate generation, staging URI patterns, transport (mTLS, HTTPS, DNS, WireGuard) fingerprints.
USB worm that evolved into a top-tier Initial Access Broker for ransomware groups. Tracking of msiexec chained with regsvr32, fodhelper.exe persistence, Tor onion C2, follow-on downloaders (FakeUpdates, IcedID, BumbleBee, Matanbuchus).
SOCKS5 proxy malware with frequent pairing with top ransomware groups (RansomHub, LockBit, Cl0p). Tracking of C2 IP rotation patterns, automated config extraction, encryption keys by family, mutex naming convention.
MaaS loader distributing follow-on Cobalt Strike, ransomware, infostealers. Tracking of packer fingerprints, HTTPS C2 protocol patterns, configuration server hostnames, build ID series. Often paired with high-conversion phishing campaigns.
The Fortgale feed is designed to fit into existing SOC team processes without requiring platform migration. Open standards (STIX 2.1 / TAXII 2.1) and native connectors for major SIEMs, EDR/XDR, firewalls, IDS/IPS.
Typical onboarding effort · 2-5 business days for native connectors. Custom integrations evaluated case by case.
Every indicator in the feed receives a confidence score (high / medium / low / deprecated) and a TTL (time-to-live) based on the typical rotation of the actor or infrastructure. No generic "malicious" flag without context.
Indicator validated by a real incident handled by Fortgale services (SOC/MDR/IR) or by multiple independent evidences on criminal infrastructure. Target false-positive rate <0.5%.
Indicator observed in a single source with coherent contextual evidence, or in a reliable external source not yet internally verified. Suggested for alerting/triage, not automatic blocking.
Candidate indicator with a single overlap element, awaiting validation. Distributed separately for analysts who want early-stage visibility, not for automatic detection.
Indicator with expired TTL or invalidated by new evidence. Remains in the feed with an explicit flag to prevent accidental re-introduction and to support retro-analysis on historical logs.
Four distribution channels, chosen based on the customer's technical stack and processes. Open standards for automatic integration, legacy formats for those without automation.
TAXII 2.1 endpoint with dedicated per-customer credentials, configurable polling (15-60 minutes typical). STIX 2.1 bundles with indicator, malware, threat-actor, attack-pattern, course-of-action objects.
REST API with OAuth2 authentication, queries by type (IP / domain / hash / YARA / Sigma), by family, by TTL window. Complete OpenAPI 3.1 documentation for custom integration.
Immediate push of high-confidence indicators as soon as produced. Delivery via HTTP webhook, native integration with Slack, Microsoft Teams, Discord. SLA < 5 minutes from validation.
For legacy systems: CSV / JSON / MISP dump daily or weekly via SFTP/HTTPS. Weekly email digest for the CISO with statistical summary (volume, novel indicators, top actors, sectors hit).
A Custom Threat Intelligence feed only makes sense if the organisation has the technical capacity to consume it: a SIEM/EDR/firewall that supports TI integration via STIX/TAXII or API, and a SOC team with capacity to integrate and manage a new source.
Without one of those two elements, the feed only produces unused noise. In those cases, vertical sector advisories (capability 03) or a periodic Executive Briefing (capability 04) are more efficient — both consumable without technical integration.
Not sure if you need it? Let's talk. If you don't need it, Fortgale will say so.
The feed's IOCs feed the SOC/MDR detection, support Incident Response in real time, and combine with Threat Actor Profiling to produce contextual intelligence on customer incidents.
Every new IOC automatically enters Fortgale SOC rules. Detection is enriched in real time with the context of actors who generated the indicator.
Discover the SOC →The Fortgale MDR does not rely solely on EDR vendor rules: it enriches them with the proprietary feed, lifting detection rates and reducing false positives.
Discover MDR →The feed answers "is this IOC malicious?". Threat Actor Profiling answers "who is behind this IOC?". Together they produce contextualised intelligence.
Discover TA Profiling →Threat Actor Profiling · Vertical advisories · Executive Briefing · Deep & Dark Web · Attack Surface Management · Brand & Social Intelligence. The feed is capability 02 of 7.
See all capabilities →The CISO evaluates the feed technically. The Board asks about ROI, sources, integration. Fortgale prepares it · three essential slides.
Cost of Custom Threat Intelligence vs generic commercial feeds · expected ROI in terms of detection rate increment and MTTR reduction.
Indicators produced from real incidents on Fortgale services and proactive research, not resold from aggregators shared with hundreds of other customers.
Existing security stack · standard STIX/TAXII integration · typical onboarding effort 2-5 days · automatic rotation and validation.
The "3 Board slides" pack is included in feed onboarding · also available on demand.
From three converging sources: ① real incidents handled daily by Fortgale's SOC, MDR and Incident Response services; ② active research by the CTI team on threat actors and criminal infrastructure; ③ continuous tracking of known offensive tools (Cobalt Strike, Sliver, infostealers, phishing kits, worms, APT tooling). These are internally produced indicators, not resold from aggregators shared with other customers.
Over 180 offensive tools and threat actors profiled by the Fortgale CTI team. They include C2 frameworks (Cobalt Strike, Sliver, Brute Ratel, Havoc, Mythic), infostealers (Lumma, RedLine, Vidar, StealC, Raccoon, Atomic), phishing kits (Tycoon 2FA, Mamba 2FA, EvilProxy, W3LL, Caffeine), worms (Raspberry Robin), loaders (SystemBC, Matanbuchus, BumbleBee, IcedID) and tooling from state-affiliated APT groups and cybercrime.
Standards: STIX 2.1 / TAXII 2.1. Channels: REST API with OAuth2, webhook (Slack, Teams, Discord), email digest, file dump (CSV, JSON, MISP). Custom Threat Intelligence integration on major MDR and SIEM platforms (Splunk, Elastic, Sentinel, QRadar, Sumo, Chronicle, CrowdStrike, SentinelOne, Defender for Endpoint, Cortex, Trend Micro Vision One).
Every IOC has a confidence score (high/medium/low/deprecated) based on source and number of independent evidences, and a TTL (time-to-live) based on the actor's typical rotation. Example: a Cobalt Strike C2 IP validated by a real incident has high confidence and 14-30 day TTL; a malware hash has high confidence and persistent TTL; a newly registered phishing kit domain has medium confidence and 48-72 hour TTL.
Yes. In addition to atomic IOCs (IPs, domains, hashes, URLs), the feed includes YARA rules for filesystem malware detection, Sigma rules for behavioural detection on SIEM, Snort/Suricata rules for IDS/IPS. All developed internally by the CTI team based on real analysed samples.
Yes. The feed is filterable by category: indicator type (IP, domain, hash, URL, YARA, Sigma), malware/kit/C2 family, actor group, sector victimology, geography, minimum confidence score. Configuration done during onboarding and modifiable via console or API.
When the organisation does not have SIEM/EDR/firewall platforms that support Custom Threat Intelligence integration, or when the security team lacks the capacity to integrate a new feed. In those cases, it is more efficient to first activate vertical sector advisories (capability 03) or a periodic Executive Briefing (capability 04), which do not require technical integration.
Request a feed sample: 7 days of real-world indicators with confidence score, TTL, and attribution. Test it in your SIEM/EDR with no commitment · evaluate false positives, coverage, integration.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.