Updated 01/07/2025
Coming into force on 08/07/2025

Initial Legal Act
Amendments
Search within this legal act

ANNEX III - Delegated Regulation 2025/1190

ANNEX III

Content of the targeted threat intelligence report (Article 10(5))

The targeted threat intelligence report shall contain information on all of the following:

1.

The overall scope of the intelligence research including at least the following:

(a)

critical or important functions in scope;

(b)

their geographical location;

(c)

official EU language in use;

(d)

relevant ICT third party services providers;

(e)

period of time over which the research is gathered.

2.

The overall assessment of what concrete actionable intelligence can be found about the financial entity, including:

(a)

the employee usernames and passwords;

(b)

the look-alike domains which can be mistaken for official domains of the financial entity;

(c)

technical reconnaissance: vulnerable or exploitable software, systems and technologies;

(d)

information posted by employees on the internet, related to the financial entity, which might be used for the purposes of an attack;

(e)

information for sale on the dark web;

(f)

any other relevant information available on the internet or public networks;

(g)

where relevant, physical targeting information, including ways of access to the premises of the financial entity.

3.

Threat intelligence analysis considering the general threat landscape and the particular situation of the financial entity, including, at least:

(a)

the geopolitical environment;

(b)

the economic environment;

(c)

technological trends and any other trends related to the activities in the financial services sector.

4.

Threat profiles of the malicious actors (specific individual/group or generic class) that may target the financial entity, including the systems of the financial entity that malicious actors are most likely to compromise or target, the possible motivation, intent and rationale for the potential targeting and the possible modus operandi of the attackers.

5.

Threat scenarios: at least three end-to-end threat scenarios for the threat profiles identified in accordance with point 4 who exhibit the highest threat severity scores. The threat scenarios shall describe the end-to-end attack path and shall include, at least:

(a)

one scenario that includes but is not limited to compromised service availability;

(b)

one scenario that includes but is not limited to compromised data integrity;

(c)

one scenario that includes but is not limited to compromised information confidentiality.

6.

Where relevant, a description of the non-threat-led scenario referred to in Article 10(4).