Skip to main content

Worked Examples: Infrastructure Pivoting

Purpose

Document how to pivot from a single IOC without building a misleading graph.

Single IOC to Candidate Cluster

Seed:
login-example[.]com observed in a phishing email.

Initial facts:
- First seen in mail telemetry: 2026-05-12
- Registrar: privacy-protected
- Hosting ASN: commodity VPS provider
- Certificate: Let's Encrypt, shared pattern with two candidate domains
- URL path: /m365/login/index.html

Assessment:
Candidate phishing cluster, not actor attribution.

Pivot Log

Pivot IDSeedPivot TypeRelated IndicatorLink StrengthDecisionReason
PIV-001login-example[.]comCertificate SANauth-example[.]comModerateAcceptedSame cert issuance window and matching URL path.
PIV-002login-example[.]comASNunrelated-vps[.]netWeakRejectedCommodity ASN with no rare overlap.
PIV-003login-example[.]comFavicon hashportal-example[.]comModeratePendingSame favicon but could be copied template.

False-Positive Controls

  • Require time-window overlap.
  • Avoid ASN-only clustering.
  • Preserve rejected pivots.
  • Separate infrastructure clustering from actor attribution.
  • Downgrade confidence when a pivot depends on commodity hosting, common TLS automation, or copied kits.

Stop Conditions

Stop pivoting when:

  • candidate links are only ASN or registrar-level;
  • time windows do not overlap;
  • every new node adds noise but no rare feature;
  • the intelligence requirement has already been answered;
  • analyst cannot explain why the next pivot is relevant.

Confidence Downgrade Example

Initial:
Medium confidence cluster based on certificate and path overlap.

After review:
Downgraded to low confidence because the same kit and favicon appear across unrelated phishing pages and the hosting provider is commodity infrastructure.