Scout + OpenCTI

Bridge the gap between static indicators and live infrastructure tracking.
Operationalize Team Cymru's Pure Signal™ directly within OpenCTI.

Request a Demo

Unified Threat Intelligence & Infrastructure Tracking

Team Cymru and Filigran have partnered to enable security teams to move beyond static blocklists. By integrating Team Cymru's Scout capabilities, OpenCTI users can now access the world's largest ocean of external threat telemetry directly within their TIP.

This integration unifies Deep Enrichment for rapid incident response and Proactive Threat Hunting for identifying unknown infrastructure. Analysts can now enrich observables with unique traffic patterns, generate high-fidelity indicators based on advanced queries, and visualize threat trends over time.

Key Capabilities of the Scout Integration

Deep Enrichment

Enrich IPs with ASN history, open ports, X.509 certificates, and traffic relationships without leaving OpenCTI.

Proactive Hunting

Turn Scout's search engine into a dynamic indicator source. Hunt for unknown threats using behavioral queries.

Automated Playbooks

Standardize complex hunts (e.g. DPRK tracking) into automated workflows that run on a schedule.

Strategic Visualization

Build dashboards to track the velocity of specific threats, ransomware groups, and malware families.

Deep Enrichment for Incident Response

Immediately enrich alerts to determine if an IP is part of an active campaign. The Scout Enrichment connector adds ASN details, open ports, and relationship data to your observables.

In Action: The screenshot demonstrates an IP address enriched within OpenCTI. Note the automatic creation of STIX relationships and the "indicators composed with this observable" section, providing immediate pivot points for analysts.

Operationalize Advanced Threat Hunting

Move beyond reactive lists. Use OpenCTI Playbooks to automate complex Scout queries that hunt for unknown infrastructure.

DPRK Use Case: The image shows a "DPRK Playbook" tracking North Korean IT workers. By running queries that look for IPs on ASNs like Star-KP or TTK communicating with Astrill VPN nodes, analysts can identify obfuscated actors before they strike.

Turn Search Results into Indicators

Automatically convert Scout search results - such as lists of IPs, domains, or controllers - into STIX indicators that are ingested directly into OpenCTI for monitoring.

Automated Intelligence: Search results are ingested as entities with relevant tags derived from Team Cymru data (e.g. "controller", "vpn", "honeypot"). This ensures your platform is always populated with the latest threat infrastructure.

Trend Analysis & Dashboards

Visualize the velocity of threats over time. By continuously running Scout connectors, you build a historical database of infrastructure changes.

Visualize Ransomware TTPs: This dashboard tracks the volume of IPs associated with tools like "Cobalt Strike" alongside ransomware families like "Rhysida" and "BianLian", giving leaders a clear view of the threat landscape.

Comprehensive Malware Family Tracking

Spot spikes in specific threats, such as Infostealers or Loaders, based on the volume of infrastructure identified by Scout.

Ready to Accelerate Your Investigations?

Combine the power of OpenCTI with Team Cymru's unrivaled Pure Signal™ data. Operationalize your threat intelligence today.

Request a Demo