Holiday Skills Carnival:
 Buy 1 Get 1 Offer
Days
Hours
Minutes
Seconds

Maltego in Cyber Threat Intelligence: A Complete Practical Guide

Author by: Pooja Rawat
Jan 21, 2026 577

In an era where cyber threats are growing explosively, security teams need every advantage to stay ahead. Consider the latest trends: over 17,000 new software vulnerabilities were disclosed in just the first half of 2024 (nearly half rated high or critical), and information-stealing malware infected 13+ million devices, compromising 53 million credentials​. Ransomware gangs like LockBit have hit hundreds of victims worldwide​. Yet many organizations struggle to implement effective threat intelligence. Why? Often, it’s a shortage of skilled analysts and resources, poor visibility into their own attack surface, and an overload of raw data with little context​. This is where Cyber Threat Intelligence (CTI) and tools like Maltego become game-changers. Maltego is a powerful platform that can merge dozens of data sources into one visual analytics tool, helping even lean Security Operations Center (SOC) teams connect the dots faster and more effectively​.

Maltego in Cyber Threat Intelligence A Complete Practical Guide.

What is Maltego?

Maltego is a graph-based link analysis tool that helps you uncover relationships between cyber entities, domains, IPs, people, emails, hashes, and more. It pulls from various sources: OSINT, commercial threat intel platforms, and even dark web data.

Unlike your usual SIEM or threat feed, Maltego presents relationships visually, allowing you to pivot across connected nodes and uncover hidden patterns. Key Benefits for Cyber Threat Intelligence:

  • Consolidates data from WHOIS, DNS, Shodan, VirusTotal, social media, and dark web.
  • Helps you attribute cyber events to threat actors.
  • Enables pivoting across layers: infrastructure → identity → behavior.

Getting Started with Maltego

Here’s how to set up Maltego:

1. Download Maltego One: From Maltego Downloads.

  • Community (CE): Free, limited transforms.
  • Maltego Pro: Ideal for SOCs and red teams.
  • Enterprise: For large-scale operations with custom integrations.

2. Register and License: Even with the CE version, you can access basic transforms using API keys from services like VirusTotal and Shodan.

3. Transform Hub Setup: Click on “Transform Hub” → Install popular transforms:

  • VirusTotal Public
  • Shodan
  • WhoisXML
  • SocialLinks
  • DarkSearch or CipherTrace (for crypto)

Core Concepts of Maltego to Know

1. Entities: Everything in Maltego begins with an Entity, domain, IP, email, BTC address, etc. Maltego comes with standard ones, and you can create custom entities.

2. Transforms: The verbs. These are the scripts (Python, typically) that take an Entity (or multiple), query a data source (a website API, a database, a local tool), and return new Entities linked to the input. They live locally or on servers (TDS – Transform Distribution Server).

3. Transform Hub: Your gateway to more power. This is where you find and install Transforms from Maltego Technologies, trusted partners (like VirusTotal, Shodan, Recorded Future, CrowdStrike, Intel471, RiskIQ, Cisco Threat Grid, MISP, ATT&CK, etc.), and the community. Many require API keys, and some are paid. Choose wisely based on your CTI needs and budget.

4. Machines: Automated sequences of Transforms. Useful for initial triage, like running a standard set of lookups on any new IP address. Saves clicks, but use judiciously; it can generate noise.

5. Views & Layouts: Ways to organize your graph visually when it gets complex. Block, Hierarchical, and Organic layouts help untangle the spaghetti. Views let you filter Entities based on type or properties.

6. Import/Export: You can import data (like lists of IoCs from a CSV) to seed your graph or export your graph data (CSV, GraphML) for reporting or use in other tools.

Maltego: A Practical Use Case

1. Threat Intelligence Collection

Scenario: An organization wants to track the threat actor “Scattered Spider.”

Goal: Collect domains, URLs, emails, and related IoCs.

Steps:

  • Start: Drag a Phrase Entity → Name it “Scattered Spider”.

  • Search Threat Data: Run Search Pulses [OTX] on the Phrase entity.

  • Extract Domains: Select results → Run To Domain Indicators [OTX].

  • Extract URLs: Filter results with weight >70 → Run To URLs [Search Engine].

  • Expand with Flashpoint: Run Phrase to Report [FR] → Extract with Report to Domain, Report to Email Address.

2. Malware Infrastructure Tracking

Scenario: You receive malware-linked IPs from DarkGate activity.

Goal: Identify associated malware samples and related infrastructure.

Steps:

  • Start: Input IPs: 5.42.77.33, 94.228.169.143, 94.228.169.123, 94.131.106.78.

  • Communicating Files: Run To Communicating Files [VirusTotal Public API].

  • Sort by Recency: Use Views → Manage View → Sort by Date/Size/Color.

  • Hash Extraction: Run To Hash [VirusTotal Public API] on recent samples.

  • Refine by Vhash: Search: vhash:7596fdd04dba990373ab2f3da0c7dd3f fs:30d+ type:js

  • Tags and Rules: Run To YARA Rules [VirusTotal] + To Tags [VirusTotal]
  • Identify Download Domains: Run To Domains in the Wild [VirusTotal Premium]

3. Vulnerability & Attack Surface Assessment

Scenario: Maltego.com is reported as possibly vulnerable.

Goal: Assess and validate the domain’s exposure.

Steps:

  • Run Network Footprint: Use Machine: L1 Network Footprint

  • Run Vulnerability Scan: Select IPs → Run To Vulnerabilities [Shodan]

  • Enumerate Services: Run To Running Software [Censys], To Services [Censys]

  • Internal View via Cymru: Run Get Existing Vulnerabilities [Cymru]
  • Run Extract affected asset [Cymru], Extract affected port [Cymru]

4. Threat Actor Profiling

Scenario: Investigating ALPHAV and Cl0p ransomware campaigns.

Goal: Build comprehensive profiles.

Steps:

  • Search Advisories: Use dorks: site:cisa.gov inurl:/cybersecurity-advisories ALPHAV
  • Extract Links and STIX Graph: Run To Links [Found on Web Page] → Filter .JSON
  • Run Get STIX2 Graph [STIX2]
  • Pivot to Indicators: Run transforms: To Domain, To IP Address, To Country, To ISP
  • Link to Personas: Run To Social Profile [Pipl], To Profile [Constella]

5. Attacks and TTPs by Region

Scenario: Understand threats linked to Ukraine.

Goal: Identify APTs and their behaviors.

Steps:

  • APT Identification: Use Find APTs associated with the country [SOCRadar]
  • Find TTPs: Use Find TTPs of the APT [SOCRadar]
  • Visual Analysis: Switch to Organic View → Use link-weighted Viewlet
  • Filter High-Touch TTPs: Copy TTPs with>3 incoming links → Run through MISP/OpenCTI

Maltego turns data chaos into intelligence clarity. Whether you’re identifying malware infrastructure or profiling a ransomware gang, it helps you visualize what matters and act on it.

CTI isn’t just about collecting indicators; it’s about building a story. And Maltego gives you the language, canvas, and tools to tell it.

Learn Maltego with InfosecTrain’s SOC Hands-on Training

To take your skills to the next level, enroll in InfosecTrain’s SOC Analyst Hands-on Training Course. This program is designed for cybersecurity professionals who want to apply tools like Maltego, Splunk, and Wireshark in real-world scenarios. Learn how to:

  • Conduct threat intelligence investigations using Maltego
  • Build detection rules mapped to MITRE ATT&CK
  • Analyze malware infrastructure and TTPs
  • Respond to incidents with confidence and clarity

Learn from expert trainers.

Get practical labs and use-case-driven instruction.

Prepare for real SOC challenges.

Ready to turn your CTI skills into SOC mastery? Enroll Now at InfosecTrain

SOC Analyst Training Course

TRAINING CALENDAR of Upcoming Batches For SOC Analyst

Start Date End Date Start - End Time Batch Type Training Mode Batch Status
14-Mar-2026 03-May-2026 19:00 - 23:00 IST Weekend Online [ Open ]
TOP