All Posts
Cyber Threat Intelligence
1
min read

Using Social Media (SOCMINT) in Threat Hunting

Learn how security teams can leverage Social Media Intelligence (SOCMINT) for threat hunting and keep false positives to a minimum.
Published on
September 26, 2019
Table of Contents
<p style="text-align: center;"><em>(Concepts and workflows developed by Chris Collins, Scott Poley, and Thomas Gorman)</em></p><p>Social Media is such a prominent activity in our online lives.  It allows its users to communicate and share information. It can also be abused for fraud, cybercrime, and the distribution of misinformation.</p><p>That being said, I have to ask the questions, “Can Social Media be effectively used to gather threat intelligence?”, “Can security teams effectively leverage Social Media Intelligence (SOCMINT), keeping false positives to a minimum?”, and “Can SOCMINT be considered another form of open-source threat intel (OSINT)?” </p><p>OSINT is a collection of intelligence that is open and available to anyone.  No subscription or authentication is required.</p><p>Examples of OSINT: Blogs, Vulnerability Feeds, RSS News Feeds, Exploit Databases, etc.  I listed examples of OSINT because there’s a common theme behind each of these focused threat classifications—the validation and qualification of the information before it is released publicly.  The author researchers a blog topic. The security tester acts as part of a bug bounty and then releases the details as part of a vulnerability feed. A journalist investigates news articles that might involve corporate breaches or exploits used in the breach.  Currently active exploits in the wild are collected.</p><p>In threat intelligence or threat hunting, context is everything.  There are a number of ways to collect or scrape raw data from social media.  Qualifying what is scraped is another story altogether. Gathering threat data from social media requires that the channel source can be validated and the data can then be processed, analyzed, and expanded with context.</p><p>In the workflow diagram below, both RSS news feeds and Twitter channels are monitored, and the data is collected using a free web-based applet called “If This, Then That” (IFTTT).  IFTTT allows subscribers to create chains of simple conditional statements that begin with monitoring web services for changes. The output of IFTTT sends an email to an orchestration platform, which, in turn, can be configured to conduct curation and formatting.  The output is then sent into Anomali ThreatStream for tracking, integration, and operationalization into the organization’s security controls (SIEM, FW, Proxy, etc.) and to support a trigger, action, response plan (TARP) workflow if one exists.</p><p><img alt="" src="https://cdn.filestackcontent.com/gBAhZ1JkSd24nj6I2kHV"/></p><p>* worklow developed by Chris Collins, Scott Poley and Thomas Gorman</p><p>So now you’re collecting SOCMINT, but what is needed to make it actionable?  There are 4 qualities to good threat intel:</p><ol><li>Complete - Is there enough information/context to make a decision?</li><li>Accurate - Is the expanded information/context enough to make a <strong>good</strong> decision?</li><li>Relevant - Is the intel related to me, my organization, and the mission?</li><li>Timely - Is the creation of intel soon enough to make a decision?</li></ol><p>What was once a challenge (the automated collection of threat data), is now standard practice, as outlined above.  The pieces of the collection and data normalization puzzle are readily available, many of them open-source. It’s the “timeliness” factor of the equation that puts security professionals and organizations to the test.</p><p>Thankfully, Threat Intelligence Management Platforms like <a href="https://www.anomali.com/products" target="_blank">Anomali</a> allow threat hunters and researchers that ability to collect third-party context on IOC’s, timelines, historical analysis and capture it in one location so that it’s available for SOC teams to make <strong>good</strong> decisions.</p><p>As teams become more versed in this process of collection, curation, reviewing and managing threat data, it becomes polished, finished intelligence that has accuracy and depth, allowing organizations to move in an anticipatory direction and make educated decisions, all in the name of risk mitigation.</p><p>The concepts and workflows introduced here will be presented in detail during the "Automating Open Source Intel (OSI)" and "Assessing Threat Information and Sources" session at <a href="https://www.anomali.com/detect-20" target="_blank">Detect '19</a> conference. </p>

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All