What is an IOC (Indicator of Compromise)?

An IOC, or Indicator of Compromise, is a technical trace or piece of evidence that points to a possible security incident, such as a Malware infection, data breach or cyberattack.

IOCs help security teams, such as a CSIRT or CERT, to:

  • Detect attacks
  • Stop their spread
  • Determine root causes
  • Clean up affected systems

🧱 Examples of IOCs

IOC type Example
IP address Traffic flow to a suspicious IP (e.g. 198.51.100.42)
Domain name / URL Connection to malicious-update[.]net
Hash value SHA-256 of malicious files or scripts
File path C:\Users\Public\svchost.exe (malware)
Registry entries Suspicious modifications to Windows Registry
Email indicators Phishing via suspicious sender or subject
User behaviour Login outside business hours from an unknown location
SCADA/OT-specific Unexpected change of Setpoint, communication with unknown PLC

🔍 IOCs in OT environments

IOCs are not only relevant for IT, but also for industrial networks, such as:

  • Traffic between SCADA and unknown external IP addresses
  • Changes to Setpoint outside of an authorised session
  • A previously inactive PLC suddenly becoming active
  • Firmware updates without planning or documentation
  • Newly created users on HMI systems

🔧 In combination with SIEM, IDS or asset monitoring tools, IOCs can be detected and investigated automatically.


🧠 IOC vs IOA

IOC (Indicator of Compromise) IOA (Indicator of Attack)
After the fact – traces of an attack Behaviour – what the attacker is trying to do
For example a malware file For example an attempted privilege escalation
Focused on detection Focused on prevention or early warning

📌 In summary

An IOC is a technical attribute pointing to a possible cyberattack or breach. It is the basis for detection, analysis and response in both IT and OT environments, and is actively used within Defense in Depth and incident detection systems such as SIEM.