Incident Response

When an incident occurs, security teams need to move fast—triaging alerts, understanding the scope of the attack, and uncovering how it unfolded. Whether you're responding to a live threat or conducting post-incident forensic analysis, access to timely and relevant intelligence is critical.

Google Threat Intelligence (Google TI) helps teams go beyond surface-level investigation. By combining curated frontline intelligence, vast crowd sourced data, and global infrastructure visibility, Google TI enables analysts to triage efficiently, pivot across related indicators, and reconstruct the full picture of an attack—all within a single platform.

How Google TI Helps During Incident Response

Google TI supports every phase of incident response, from initial triage to post-incident action:

Investigation & Triage

  • Pivot from a single IoC (file hash, domain, IP, or URL) to discover related infrastructure and campaigns.
  • Visualize relationships between indicators using the interactive Threat Graph.
  • Access intelligence on malware families, threat actors, and campaign reports.
  • Use YARA rules and Retrohunt to discover files across the dataset that exhibit similar structure or behavior to known malware.
  • Map TTPs observed in the incident to better understand attacker behavior.
  • Correlate with exploited CVEs using vulnerability intelligence to prioritize remediation.

Operationalizing Intelligence

  • Feed high-confidence IoCs into SIEM, SOAR, and EDR tools to block ongoing activity.
  • Update detection rules and blocklists across firewalls, proxies, DNS, etc.
  • Use findings to guide threat hunting and detect similar activity in your environment.
  • Improve policies and controls based on observed attacker TTPs and infrastructure.

Use Cases

From a Phishing Email to Uncovering a Targeted Campaign

An employee reports a suspicious email. Your goal: analyze the attachment to uncover whether it’s part of a larger campaign—and if so, who’s behind it.

How to do it

  1. Search the file using Private Scanning in Google TI.

  2. Open the Threat Graph to explore relationships between the file and associated URLs, domains, and infrastructure.

  3. Investigate related indicators in the Relations tab—e.g., other URLs hosting the same file, or similar attachments.

  4. Use TTP Investigation to identify techniques and behaviors associated with the file or campaign.

  5. Correlate with known actors or campaigns to understand attribution, targeting, and intent.