Threat hunting is the process of looking for cyber threats that make it past an organisation's perimeter cyber defence systems undetected, and already exist in its environment. It is especially useful for post-compromise detection of Advanced Persistent Threats (APTs) or advanced attacks that are either state-sponsored, or funded by large, organised criminal groups. The main premise of threat hunting is that an intrusion has already occurred and undetected threats exist in an internal network.
"Threat hunting is the human-driven activity of proactively and iteratively searching through the organization's environment (network, endpoints and applications) for signs of compromise in order to shorten the dwell time and minimize the breach impact for the organization."
Practical Threat Intelligence and Data-Driven Threat Hunting, Valentina Palacin
Threat actors are always looking for security loopholes and new vulnerabilities that allow them to successfully penetrate a network undetected. Even the most advanced tools can't detect and block every threat, and the threats that aren't caught at the perimeter can remain in enterprise networks for a long time – from several weeks to several months. This extended lifespan of a threat allows attackers to move laterally through the network, steal sensitive data, disrupt operations and cause irrevocable damage to businesses.
For instance, in a ransomware attack, an attacker has to go through multiple stages (initial access, command & control, lateral movement, privilege escalation) prior to the point where data can be encrypted and exfiltrated. An organisation with strong threat hunting capabilities and a defence-in-depth approach to security will very likely catch the threat before the final stage, preventing massive potential losses.
In September 2020, the National Institute of Standards and Technology (NIST) included Threat Hunting as one of the controls under its Security and Privacy Controls for Information Systems and Organizations [Special Publication 800-53, Revision 5, Risk Assessment (RA-10)]. The reason this is important is that:
While threat hunting was being employed by security teams even prior to NIST's inclusion of it in SP 800-53, its standardisation as a security control formalised its use for detection. It also gave organisations looking for security services a way to better assess threat hunting MDR service providers.
A SOC analyst monitors network activity, and handles, triages and escalates security alerts generated by threat detection tools. These are usually threats with known signatures and IoCs fed into a SIEM platform, and the analyst's role is to respond appropriately when an alert is thrown. The role is reactive in nature, meaning that the analyst takes action only when a threat is detected by a tool.
A threat hunter, on the other hand, proactively looks for threats that make it into the company network undetected. The idea here is to find malicious activity and threats that are missed by the tools. Threat hunting is usually informed by a deep understanding an organisation's IT environment, the region or industry it is operating in, and current attack trends. It relies heavily on human intelligence and analytical ability, along with technology to ingest and parse vast amounts of data.
While there is no ideal combination of skills and traits that threat hunters must have, it helps if they:
For a hunt to be effective, it is critical for the threat hunter to have complete, end-to-end visibility into the target network and endpoints. In advanced threat hunting, logs collected from endpoints, Windows events, antivirus tools, and proxies/firewalls are ingested by a security data lake (included in most next-gen SIEM solutions). This data can then be normalised, enriched, searched through, and analysed by hunters using powerful behaviour analytics and machine learning tools.
Threat intel-based hunting is a reactive hunting model based on Indicators of Compromise (IoCs) from threat intelligence sources input into the company SIEM to generate alerts. The IoCs can be hash values, domain names, IP addresses, networks, and host artifacts, among others.
Hypothesis-based hunting is a proactive threat hunting model that focuses on attacker tactics, techniques and procedures (TTPs), as opposed to IoCs. It starts with the hunt team forming a hypothesis based on possible attack scenarios and adversaries, and then focusing on the techniques that would support the hypothetical attack. Threat hunters use attacker TTPs and global detection playbooks to find anomalous activity.
Custom hunting is based on an organisation's specific requirements and the context in which the hunt is to be conducted. It can be informed by an industry trend, a geopolitical situation, or specific threats that an organisation finds itself most vulnerable to. Custom hunting uses a combination of techniques from the first two hunting models.
While different organisations may plan and carry out their hunts in various different ways, they usually include some or most of the following steps:
One of the biggest reasons for the emergence and popularity of Managed Detection and Response (MDR) is its focus on finding stealthy, advanced threats that already exist within an enterprise environment, undetected by perimeter tools. Threat hunting fits perfectly into this use case due to its proactive nature and the fact that it relies on human intelligence and the creative use of cyber threat intel to look for post-compromise threats. This makes it an integral part of any reputed MDR service. It is also among the cyber security services that are best handled by professionals because of the expertise and specific skillset and tools required to execute it successfully.
LINEARSTACK's MDR service includes both active and proactive threat hunting to look for advanced threats in your environment. Our threat hunting team conducts regular table top exercises, and dedicates more than 80 hours a week to malware and threat research.
We use the MITRE ATT&CK Framework to plan our threat hunts, and continually develop new hunt cases to run in your environment in order to detect malicious activity that is not picked up by automated technologies. Our team's deep knowledge of emerging threats, combined with high-fidelity telemetry and real-time visibility into your environment, makes threat discovery faster and more reliable.
To know more about how our threat hunting capabilities and 24/7 MDR service can augment your cyberdefence, book a free two-hour consult with one of our experts. You can email us at info@linearstack.co.nz or call us at 0800 008 795.
Read more here: https://www.linearstack.co.nz/managed-services/managed-detection-response