Maltiverse, powered by Lumu Technologies, revolutionizes threat intelligence management by providing a cloud-based platform that simplifies the ingestion, analysis, and dissemination of Indicators of Compromise (IoCs). If you're using MISP (Malware Information Sharing Platform) for threat sharing, you may encounter common challenges such as ongoing maintenance of on-premise servers, unreliable intelligence leading to false positives, lack of automatic IoC expiration, and limited integrations with commercial cybersecurity tools. Maltiverse addresses these pain points head-on: as a fully cloud-based Threat Intelligence Platform (TIP), it eliminates maintenance overhead, employs advanced methods to prevent false positives through rule-based patterns, whitelists, and third-party validations, enables configurable automatic IoC expiration and downgrading, and offers over 30 seamless integrations with leading commercial technologies.
By integrating your MISP instance with Maltiverse via the MISP Ingest Plugin, you can effortlessly synchronize IoCs, enhancing your cybersecurity stack with curated, actionable intelligence that supports Continuous Compromise Assessment and empowers your SOC team to respond faster to emerging threats. This integration not only streamlines IoC synchronization but also serves as a cornerstone for optimizing threat intelligence workflows. Whether you're a security analyst managing private IoCs or an MSP integrating with client ecosystems, Maltiverse's MISP ingest feature ensures reliable data flow, reducing operational friction and boosting your organization's threat detection capabilities.
In this article, you'll learn how to configure the plugin, understand data mapping, and leverage it for real-world use cases.
This integration is designed to seamlessly pull attributes from a MISP instance and convert them into Indicators of Compromise (IOCs) within Maltiverse.
Before starting the configuration, ensure you have the following:
Only Maltiverse Platform teams are authorized to upload IOCs to Maltiverse Instances.
Follow these instructions to integrate your MISP instance.
1. Access the Maltiverse Portal.
2. Go to Platform > Connectors.
3. Filter the list by INGEST. Then, select MISP Ingestion.
4. Click + Add MISP to create a new plugin.
5. Configure the configuration form as follows:
https://misp.example.com6. Once you fill up the form, click Test Connection to verify the connectivity.
The integration will attempt to connect to the MISP instance hourly, so you may save the configuration even if the test is currently failing.
7. Click Save to confirm the configuration. The plugin will be scheduled to start pulling attributes. Note that it may take some time before the new indicators appear online.
Once a plugin is configured, the status will show you how it is behaving with these four options:
| Status | Description |
| Pending | Yet to be executed |
| Online | The plugin is working as expected |
| Unreachable | Cannot connect to remote MISP Instance |
| Disabled | The plugin is not enabled by the user |
On the Ingest Plugin table, use the 🔍 button to search for the IOCs fetched by the plugin.
MISP attributes are mapped to Maltiverse IOC types as follows:
Incoming attributes are classified based on the to_ids flag. In MISP, the field to_ids indicates whether an indicator is suitable to be used as an Indicator of Compromise (IoC) for detection by security tools. The field is mapped as:
The following metadata fields are populated:
If you encounter issues with the plugin (such as an Unreachable status), please verify the following configurations: