🤖 AI Summary
To address the scarcity, high noise level, and labeling difficulty of Cyber Threat Intelligence (CTI) data on Telegram, this paper proposes an end-to-end automated pipeline. First, domain knowledge is leveraged to identify 150 candidate threat channels; after expert curation, 12 high-quality sources are retained, yielding 145,000 cleaned messages. Second, a BERT-based binary classifier achieves 96.64% accuracy in threat-content filtering, followed by regex-based extraction and expert validation to derive structured Indicators of Compromise (IoCs). Finally, we construct the largest and highest-fidelity native Telegram CTI dataset to date—comprising 86,509 verified malicious IoCs (domains, IPs, URLs, hashes, CVEs), spanning ransomware, phishing, and malicious infrastructure threats. This dataset significantly advances CTI model development, evaluation, and benchmarking, providing a reproducible and scalable foundation for open-source threat intelligence research.
📝 Abstract
Cyber Threat Intelligence (CTI) enables organizations to anticipate, detect, and mitigate evolving cyber threats. Its effectiveness depends on high-quality datasets, which support model development, training, evaluation, and benchmarking. Building such datasets is crucial, as attack vectors and adversary tactics continually evolve. Recently, Telegram has gained prominence as a valuable CTI source, offering timely and diverse threat-related information that can help address these challenges. In this work, we address these challenges by presenting an end-to-end automated pipeline that systematically collects and filters threat-related content from Telegram. The pipeline identifies relevant Telegram channels and scrapes 145,349 messages from 12 curated channels out of 150 identified sources. To accurately filter threat intelligence messages from generic content, we employ a BERT-based classifier, achieving an accuracy of 96.64%. From the filtered messages, we compile a dataset of 86,509 malicious Indicators of Compromise, including domains, IPs, URLs, hashes, and CVEs. This approach not only produces a large-scale, high-fidelity CTI dataset but also establishes a foundation for future research and operational applications in cyber threat detection.