Threat hunting explained: what is cyber threat hunting?
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
The process of threat hunting involves proactively searching for malware or attackers that are hiding within a network. Rather than simply relying on security solutions or services to detect threats, threat hunting is a predictive element to a layered security strategy, empowering organizations to go on the offensive looking for threats. Threat hunting is typically carried out by highly skilled security professionals using sophisticated toolsets to identify and stop hard-to-find malicious activities on a network.
According to Microsoft, an attacker resides on a compromised network a median time of 146 days before being discovered, making this kind of attack an advanced persistent threat (APT). In this amount of time, attackers residing on a network in stealth, can exfiltrate data, access applications to identify and use business details to commit fraud, or laterally move through a network gathering credentials for access to even more valuable data and resources.
Organizations implementing good security practices and tools such as antivirus, email, and web scanning, firewalls, etc. are taking the necessary first steps. A layered security strategy can be effective in stopping the majority of cyberattacks. However, it should be assumed that some small percentage of advanced attacks will evade detection by traditional security solutions, giving cyber criminals access to an organization’s network for as long as they deem necessary to carry out their malicious activities. Because of the potential risk, it’s this small percentage of attacks that can spur an organization to participate in threat hunting.
Implementing a security posture that prevents and detects attacks is defensive in nature – as the idea is to attempt to stop an attack before it happens. Threat hunting is a predictive and offensive tactic, based on the assumption that an attacker has already successfully gained access (despite an organization’s best efforts). Threat hunting uses a mixture of forensics capabilities and threat intelligence to track down where attackers have established footholds within the network and eliminate their access before any damaging malicious actions can take place.
Threat detection, incident response, and compliance management in one, unified solution.
Learn moreThreat hunting generally begins with security analysts working through threat intelligence, understanding of the environment they secure, and other security data sources to postulate about a potential threat. Threat hunters then look for indicators of compromise (IoCs) found in forensic “artifacts” to identify threatening activity that align with the hypothesized threat activity.
These artifacts are bits of data from server logs, network traffic, configurations, and more that help threat hunters determine if suspicious activities have taken place. Artifacts include:
The path taken during the “hunt” is only defined by the details discovered. For example, spotting anomalous outbound network traffic would lead a threat hunter to take a closer look at the endpoint transmitting that traffic. Thus, there’s no one established threat hunting process that applies to every hunt.
Cyber threat hunters need to examine both historical and current state details of what actions have transpired on systems and across the network. They need to rely on a number of tools and data sources to assist with their investigations. These include:
One of our key brand promises is to deliver our customers the tactical threat intelligence needed for timely and resilient detection and response to threats against their organization.
LevelBlue Labs delivers breakthrough visibility across your business via our unrivaled vantage point of the threat landscape. We collect diverse threat data for analysis, interpretation, and enrichment from our global sensor network, LevelBlue proprietary data sources, and LevelBlue Labs Open Threat Exchange (OTX). This tactical threat intelligence is integrated into our Unified Security Management (USM) platform and our Managed Threat Detection and Response service. Learn more by visiting our LevelBlue Labs main page.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.