Articles on: Concepts & Methodology

IoPA vs IoC: What's the Difference?

IoPA vs IoC: What's the Difference?



Category: Concepts & Methodology



Indicators of Compromise (IoC) - Traditional



  • When detected: After the attack
  • What it shows: Evidence of compromise
  • Action: Incident response
  • Example: Malware hash found on endpoint



Indicators of Pre-Attack (IoPA) - Malanta



  • When detected: During attacker's preparation phase
  • What it shows: Evidence of intent
  • Action: Pre-emptive prevention
  • Example: Phishing domain registered mimicking your brand



Key Insight



IoCs tell you what happened. IoPAs tell you what's about to happen.



IoPAs are derived from AI/ML analysis of diverse datasets including OSINT, malicious identity registries, domain/hosting records, and internet resource databases. They highlight behaviors like suspicious domain registrations, allocations at bulletproof hosting providers, and phishing kit distribution.



Unlike traditional IOCs (which appear after compromise), IoPAs reveal staging infrastructure at the Reconnaissance and Resource Development phases of the MITRE ATT&CK framework.

Updated on: 26/02/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!