{"id":796,"date":"2024-11-07T06:03:31","date_gmt":"2024-11-07T06:03:31","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=796"},"modified":"2024-11-07T06:03:31","modified_gmt":"2024-11-07T06:03:31","slug":"threat-hunting-strategic-approaches-and-capabilities-to-uncover-hidden-threats","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=796","title":{"rendered":"Threat Hunting: Strategic Approaches and Capabilities to Uncover Hidden Threats"},"content":{"rendered":"<div class=\"elementor elementor-7866\">\n<div class=\"elementor-element elementor-element-5b2050a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-3d0512a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What is Threat Hunting?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1366cde elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Threat hunting is the discovery of malicious artifacts, activity or detection methods not accounted for in passive monitoring capabilities. Essentially, threat hunting is the process of identifying unknown threats that otherwise would be hiding in your network and on your endpoints, lying in wait to further expand access and\/or steal sensitive data.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Successful threat hunting usually involves creating hypotheses based on attacker TTPs and using these to find unusual patterns or indicators that traditional security measures might miss. This proactive method also helps create special markers and behavioral signs, improving the ability to detect threats in real-time.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-40728425 e-con-full elementor-hidden-mobile e-flex e-con e-parent\">\n<div class=\"elementor-element elementor-element-25c4c513 elementor-hidden-mobile e-flex e-con-boxed e-con e-child\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-e9767a9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Quick Stats<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1d21796f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW245847723 BCX8\"><span class=\"NormalTextRun SCXW245847723 BCX8\">Here are some industry stats to illustrate the urgency and effectiveness of cyber threat hunting<\/span><span class=\"NormalTextRun SCXW245847723 BCX8\">:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fb83ac2 e-grid e-con-full e-con e-child\">\n<div class=\"elementor-element elementor-element-d1da0a7 elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t21 days\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tis the average dwell time of cyber threats\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4d40492 elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t57%\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tof breaches involving undetected TTPs\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-af7d3e8 elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t3.5 million\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tis the Projected global cybersecurity talent gap\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-75eb14b elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\t45%\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tincrease in ROI for organizations investing in dedicated threat hunting capabilities\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0e7e3fb e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-8dcfe5e elementor-widget elementor-widget-related_posts\">\n<div class=\"elementor-widget-container\">\n<div class=\"related-posts-widget-wrapper \">\n<div class=\"related-posts-wrapper\">\n<h3>Recommended Reading<\/h3>\n<p>For a deeper guide about Threat Hunting and best practices, explore our comprehensive whitepaper:<\/p>\n<div class=\"ecs-posts elementor-posts-container elementor-posts\">\n<div class=\"elementor elementor-34020\">\n<div class=\"elementor-element elementor-element-f28dba2 horizontal-post e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-fd2ab81 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-16de3a1 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/threat-hunting-defined\/\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3649aa7 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-0543f95 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/threat-hunting-defined\/\">Mastering Threat Hunting: Your Edge Against Hidden Cyber Threats<\/a><\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4f21d88 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/threat-hunting-defined\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-icon\"><br \/>\n\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read More<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-113c5e8 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-65b9466 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Three Strategic Approaches for Threat Hunt<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8699d7e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Retrospective Discovery<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2aacf79 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW114400519 BCX8\"><span class=\"NormalTextRun SCXW114400519 BCX8\">This approach <\/span><span class=\"NormalTextRun SCXW114400519 BCX8\">leverages<\/span><span class=\"NormalTextRun SCXW114400519 BCX8\"> new internal or external intelligence (<\/span><span class=\"NormalTextRun SCXW114400519 BCX8\">i.e.<\/span><span class=\"NormalTextRun SCXW114400519 BCX8\"> new IOC) to look back across the environment to see if a threat exists that was not previously detected.<\/span><\/span><span class=\"EOP SCXW114400519 BCX8\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7b5093a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Artifact Discovery<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9366db8 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW82090133 BCX8\"><span class=\"NormalTextRun SCXW82090133 BCX8\">Statistical analysis approach, using machine learning to collate, aggregate and crunch the data to find abnormalities (<\/span><span class=\"NormalTextRun SCXW82090133 BCX8\">i.e.<\/span> <span class=\"NormalTextRun SCXW82090133 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW82090133 BCX8\"> the least used user agent string over the last <\/span><span class=\"NormalTextRun SCXW82090133 BCX8\">30 days<\/span><span class=\"NormalTextRun SCXW82090133 BCX8\"> and analyze why that is)<\/span><\/span><span class=\"EOP SCXW82090133 BCX8\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-95a590f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Activity Discovery<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-947a0f2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW90831716 BCX8\">This type of threat hunting is where analysts <\/span><span class=\"NormalTextRun SCXW90831716 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW90831716 BCX8\"> patterns of behaviors (TTPs) that could be malicious.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-159051a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-b344e88 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Why is Threat Hunting Important?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-64ea5d0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Threat hunting is derived from a shift in the approach by security professionals on how to address risks within the organization. Previously, the focus was on building defense-in-depth and quickly reacting to suspicious activity \u2013 a \u201cVulnerability-Centric\u201d approach.<\/span><\/p>\n<p><span>More organizations are beginning to shift their approach to ensure greater visibility within the environment and proactively <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/machine-learning-combats-network-threats\/\">look for anomalous activity<\/a> based on various profiles and behaviors of attacks, attackers, and their tools. This detection-based paradigm shift is considered a \u201cThreat-Centric\u201d approach of which threat hunting is a core component.<\/span><\/p>\n<p><span>Threat hunting provides organizations with a method for taking a proactive approach to the identification of sophisticated, unknown threats\u2026 threats that have evaded preventative and signature-based detection methods. As research has shown, the average dwell time (where an attacker is hunkered down inside a network before being discovered) is measured in months.<\/span><\/p>\n<p><span>Threat hunting is a way to find attackers inside the network before they have had the opportunity to cause real damage \u2013 either by disrupting operations or stealing sensitive data. Additionally, threat hunting can be used to create new behavioral tactics, techniques, and procedures (TTPs) that can be added to existing detection methods\/rules\/tools\/and intelligence. A threat hunting endeavor will help identify activity that may have gone unnoticed over time or across the infrastructure.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5e1fdcb e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-c08da50 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Threat Hunting vs. Threat Intelligence<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5114711 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW33613378 BCX8\"><span class=\"NormalTextRun SCXW33613378 BCX8\">Threat hunting and <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">threat intelligence<\/a> are usually seen as related but separate activities in cybersecurity. Both help improve security by being proactive, but they have different goals:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5b5b819 e-grid e-con-full e-con e-child\">\n<div class=\"elementor-element elementor-element-5bd8027 elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\tThreat hunting\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tinvolves actively looking for unknown threats in your system, using hypotheses to find specific behaviors or artifacts indicative of malicious activity. Cyber threat hunting is a proactive, hands-on activity usually done by specialized teams.\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c428670 elementor-view-stacked elementor-shape-circle elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-icon-box-wrapper\">\n<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span class=\"elementor-icon elementor-animation-\"><br \/>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n<div class=\"elementor-icon-box-content\">\n<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span><br \/>\n\t\t\t\t\t\t\tThreat intelligence\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/h3>\n<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tinvolves gathering, processing, and analyzing data about existing threats, like IOCs, TTPs, and attack trends. This information helps the threat-hunting process by giving details on the latest methods used by attackers.\t\t\t\t\t<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-60d51ba elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW190877755 BCX8\">While t<\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">hreat intelligence provides information about known threats, threat hunting uses t<\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">hat <\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">information<\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">\/data<\/span><span class=\"NormalTextRun SCXW190877755 BCX8\"> to find unknown or undetected <\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">elements <\/span><span class=\"NormalTextRun SCXW190877755 BCX8\">within a company\u2019s systems.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0be9657 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-d55b329 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Where to Start Threat Hunting?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b80fd56 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW232030529 BCX8\">Before threat hunting can begin, a prioritized set of questions must be <\/span><span class=\"NormalTextRun SCXW232030529 BCX8\">determined<\/span><span class=\"NormalTextRun SCXW232030529 BCX8\"> as these will drive the hunt. You also must understand your infrastructure and your data as that will <\/span><span class=\"NormalTextRun SCXW232030529 BCX8\">impact<\/span><span class=\"NormalTextRun SCXW232030529 BCX8\"> what types of threat hunting activities you can conduct. Also important is understanding the <\/span><span class=\"NormalTextRun SCXW232030529 BCX8\">expertise<\/span><span class=\"NormalTextRun SCXW232030529 BCX8\"> on hand as that will <\/span><span class=\"NormalTextRun SCXW232030529 BCX8\">impact<\/span><span class=\"NormalTextRun SCXW232030529 BCX8\"> threat hunting as well. Threat hunting is an advanced, but highly beneficial capability that requires the right people, <\/span><span class=\"NormalTextRun SCXW232030529 BCX8\">technology<\/span><span class=\"NormalTextRun SCXW232030529 BCX8\"> and data to help answer the critical hypotheses that are created.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-532acb5a e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-24139ce6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Catch the Threats that Other Tools Miss<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-60cf581e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW105288150 BCX8\"><span class=\"NormalTextRun SCXW105288150 BCX8\">Explore Fidelis Security\u2019s Active Threat Detection Using proprietary algorithms developed by Fidelis Security\u2019s expert threat hunters! <\/span><\/span><strong><em><span class=\"TextRun SCXW5999525 BCX8\"><span class=\"NormalTextRun SCXW5999525 BCX8\">What This Datasheet Covers:<\/span><\/span><span class=\"EOP SCXW5999525 BCX8\">\u00a0<\/span><\/em><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-72c2a112 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Introduction to Active Threat Detection<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Capabilities<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Advantages<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-13a25af4 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/active-threat-detection\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Datasheet<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b0b7cef e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-aca6652 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Effective Threat-Hunting Tools<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2e349ae elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW210590114 BCX8\"><span class=\"NormalTextRun SCXW210590114 BCX8\">In 2024, using the right tools for <\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">threat-hunting<\/span><span class=\"NormalTextRun SCXW210590114 BCX8\"> is <\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">very important<\/span><span class=\"NormalTextRun SCXW210590114 BCX8\"> for <\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">proactive<\/span><span class=\"NormalTextRun SCXW210590114 BCX8\"> and <\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">efficient defense<\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">. Here are four key tools to <\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">consider<\/span><span class=\"NormalTextRun SCXW210590114 BCX8\">:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4a79ff1 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Extended Detection and Response (XDR)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bd680bb elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>XDR is not a singular threat-hunting tool; it\u2019s an integrated security platform that gathers information from various places like endpoints, networks, and cloud environments, and puts it all together in one place.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\"><span>Fidelis Elevate<\/span><\/a>\u00ae<span> is an example of an XDR solution that helps find threats by correlating data from these different areas, making it easier to understand and quicker to investigate. XDR supports threat hunters by making detection centralized, speeding up responses, and giving a comprehensive context that allows for more accurate and efficient threat-hunting.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ce560d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Managed Detection and Response (MDR)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bbaac53 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW124213148 BCX8\">MDR services <\/span><span class=\"NormalTextRun SCXW124213148 BCX8\">offers expert-led threat monitoring, detection, and incident response, providing continuous protection and support. It<\/span><span class=\"NormalTextRun SCXW124213148 BCX8\"> is especially useful for companies <\/span><span class=\"NormalTextRun SCXW124213148 BCX8\">facing cybersecurity talent <\/span><span class=\"NormalTextRun SCXW124213148 BCX8\">gaps or<\/span><span class=\"NormalTextRun SCXW124213148 BCX8\"> those needing robust <a href=\"https:\/\/fidelissecurity.com\/use-case\/threat-hunting\/\">threat-hunting capabilities<\/a> around the clock<\/span><span class=\"NormalTextRun SCXW124213148 BCX8\">.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a6c5250 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Security Information and Event Management (SIEM)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d6ad0d9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span class=\"TextRun SCXW41315967 BCX8\"><span class=\"NormalTextRun SCXW41315967 BCX8\">SIEM solutions collect log data from across the network, allowing for better detection and understanding of advanced threats and complex attack patterns. By <\/span><span class=\"NormalTextRun SCXW41315967 BCX8\">integrating <\/span><span class=\"NormalTextRun SCXW41315967 BCX8\">with SIEM platforms, <\/span><\/span><a class=\"Hyperlink HyperlinkGateOff SCXW41315967 BCX8\" href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun Underlined UnderlinedGateOff SCXW41315967 BCX8\"><span class=\"NormalTextRun SCXW41315967 BCX8\">Fidelis Network<\/span><\/span><\/a>\u00ae<span class=\"TextRun SCXW41315967 BCX8\"><span class=\"NormalTextRun SCXW41315967 BCX8\"> improves threat detection and response by providing more comprehensive visibility and useful information about <\/span><span class=\"NormalTextRun SCXW41315967 BCX8\">what\u2019s<\/span><span class=\"NormalTextRun SCXW41315967 BCX8\"> happening on the network.<\/span><\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6e79643 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">4. Security Analytics<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-99b0f84 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW184734035 BCX8\">Security analytics tools use <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/ndr-detect-threats-modeling-application-protocol-behaviors\/\">machine learning and behavioral analysis<\/a> to find unusual activities and give useful information about potential threats. These tools are important for discovering sophisticated, <\/span><span class=\"NormalTextRun SCXW184734035 BCX8\">low-and-slow attacks<\/span><span class=\"NormalTextRun SCXW184734035 BCX8\"> that traditional security might overlook.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bbb0ee9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">5. Endpoint Detection and Response (EDR)<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f55a63a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW257476888 BCX8\"><span class=\"NormalTextRun SCXW257476888 BCX8\">EDR tools <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">focus <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">on <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">endpoint visibility<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">, helping teams<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\"> to<\/span> <span class=\"NormalTextRun SCXW257476888 BCX8\">detect<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">, <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">investigate<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">, and <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">respond to <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">threats fast. <\/span><\/span><a class=\"Hyperlink HyperlinkGateOff SCXW257476888 BCX8\" href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun Underlined UnderlinedGateOff SCXW257476888 BCX8\"><span class=\"NormalTextRun SCXW257476888 BCX8\">Fidelis Endpoint<\/span><\/span><\/a>\u00ae<span class=\"TextRun SCXW257476888 BCX8\"><span class=\"NormalTextRun SCXW257476888 BCX8\"> provides real-time <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">monitoring<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">, automatic <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">response<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">, and <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">forensic <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">analysis, letting security teams <\/span><span class=\"NormalTextRun SCXW257476888 BCX8\">identify<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\"> lateral movement<\/span><span class=\"NormalTextRun SCXW257476888 BCX8\"> and protect devices from complex attacks.<\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW229705924 BCX8\"><span class=\"NormalTextRun SCXW229705924 BCX8\">These tools provide <\/span><span class=\"NormalTextRun SCXW229705924 BCX8\">a strong base<\/span><span class=\"NormalTextRun SCXW229705924 BCX8\"> for successful threat hunting, improving visibility and strengthening an organization\u2019s capability to find and respond to complex threats.<\/span><\/span><span class=\"EOP SCXW229705924 BCX8\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6c3adc9 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-dc842fb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What are Key Capabilities to Look for in a Threat Hunting Capability?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b14d819 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Threat hunting requires the right expertise, along with the tools and data, so the first thing to determine is if that expertise is on staff, to be hired, or to be outsourced. Often times organizations will look to outsource their threat hunting capability through a Managed Detection and Response provider.<\/span><span>\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><em><strong>Important capabilities and data to effectively conduct threat hunting activities include the following:\u00a0<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-20705c6 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">People Skills<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f135991 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Threat hunting requires a unique skillset that combines multiple disciplines of security infrastructure, threat intelligence, malware analysis, data analytics and forensics, and creativity.<\/span><span>\u00a0<\/span><span>\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><strong>Threat hunters should have:<\/strong><\/p>\n<p><span>An understanding of both networks and how operating systems (OS) work in an infrastructure.<\/span><span>\u00a0<\/span><span>A background or understanding of analytic tradecraft, including the ability to create hypotheses and test those against assumptions (including biases).<\/span><span>\u00a0<\/span><span>An understanding of how attacker TTPs from both a process and\/or tool perspective.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e07b05f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Threat Hunting Process<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d506cd3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>A threat hunting process should begin by defining the level of importance that cyber risk has upon the business, what potential threats could occur and how those threats would create risk. Existing tools and teams should be used to profile the infrastructure and ensure that the profile stays up-to-date. Part of the threat hunting process also includes determining what information you need to collect and for how long, as well as what must be analyzed to ensure proactive threat analysis. By focusing on the areas within the Pyramid of Pain, you can gain the greatest impact, while minimizing alert fatigue.<\/span><\/p>\n<p><span>Once your threat hunting process is defined, create a set of rules to identify the risk or threat and metrics to address efficiency (i.e. how many alerts are generated by a new rule versus how many tickets are closed by analysts).<\/span><\/p>\n<p><span>Use the profile of the environment and the information collected to address the following questions:<\/span><span>\u00a0<\/span><\/p>\n<p><span>What can be automated versus what should be analyzed?<\/span><span>\u00a0<\/span><span>What should be the focus in terms of intel sources?<\/span><span>\u00a0<\/span><span>How are you incorporating the analysis process and cross-verifying with the information, such as the MITRE ATTACK framework?<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c064800 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW227859491 BCX8\">By having a strong documentation and feedback process for the threat hunting activity, you can <\/span><span class=\"NormalTextRun SCXW227859491 BCX8\">leverage<\/span><span class=\"NormalTextRun SCXW227859491 BCX8\"> the postmortem of the activity and results to further refine the process and the Cyber Threat Intelligence (CTI) IOCs.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6048fa0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Technology<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1b65060 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The third pillar of being ready to conduct threat hunting exercises is having the right technology in place. If possible, ensure security solutions can collect metadata from multiple layers in real-time. Oftentimes a SIEM will provide a repository of raw logs but may lack the capabilities or will be over-subscribed to allow for hunting activities to occur within a specific timeframe.<\/span><\/p>\n<p><span>Key capabilities to look for in a solution that will enable threat hunting include the ability to:<\/span><\/p>\n<p><span>Ingest and store metadata from network and cloud traffic, as well as endpoint activity for <a href=\"https:\/\/fidelissecurity.com\/use-case\/threat-detection\/\">real-time threat detection<\/a> and retrospective analysis.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Overlay that rich metadata with threat intelligence and run scripts to capture specific data for visibility and context.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Import live data from various sources (i.e. network traffic and endpoint activity) into a solution where correlation of real-time and historical activity can occur to enhance visibility and validate the activity.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Provide visibility across the cyber terrain to validate against the current environment.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Leverage a deception layer that can be used to provide context or validation of activity.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Foster the analyst\u2019s creativity to help identify anomalous activity with an extensible query solution for hosts.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Quickly pull forensic images of memory or the hard drive for further analysis.<\/span><span>\u00a0<\/span>\n\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-39cea54 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-372e539c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Ask Questions<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-643e8473 elementor-widget elementor-widget-eael-adv-accordion\">\n<div class=\"elementor-widget-container\">\n<div class=\"eael-adv-accordion\">\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What frameworks support threat hunting?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span class=\"NormalTextRun SCXW60696822 BCX8\">The MITRE ATT&amp;CK and Pyramid of Pain frameworks are commonly used to help recognize tactics, techniques, and procedures (TTPs) and <\/span><span class=\"NormalTextRun SCXW60696822 BCX8\">prioritize threat-hunting efforts<\/span><span class=\"NormalTextRun SCXW60696822 BCX8\">. Both frameworks offer a systematic way to understand and tackle the actions of adversaries and the most <\/span><span class=\"NormalTextRun SCXW60696822 BCX8\">important areas<\/span><span class=\"NormalTextRun SCXW60696822 BCX8\"> of risk.<\/span><\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What are common challenges in threat hunting?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span class=\"NormalTextRun SCXW232859778 BCX8\">Threat hunting has <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">challenges <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">like limited resources, alert <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">fatigue<\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">, and a need for highly skilled professionals. As more threats use AI, it becomes harder to tell <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">legitimate<\/span><span class=\"NormalTextRun SCXW232859778 BCX8\"> activities from <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">malicious <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">ones, <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">underscoring <\/span><span class=\"NormalTextRun SCXW232859778 BCX8\">the importance of advanced tools and well-trained analysts.<\/span><\/p>\n<\/div><\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header active-default\">\n<h3 class=\"eael-accordion-tab-title\">How often should threat hunting be conducted?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix active-default\">\n<p><span>The frequency of threat hunting depends on an organization\u2019s risk tolerance, available resources, and the threat landscape. Many organizations conduct continuous threat hunting, while others do so on a periodic basis, such as monthly or quarterly, based on their specific needs.<\/span><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-detection-response\/what-is-threat-hunting\/\">Threat Hunting: Strategic Approaches and Capabilities to Uncover Hidden Threats<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is Threat Hunting? Threat hunting is the discovery of malicious artifacts, activity or detection methods not accounted for in passive monitoring capabilities. Essentially, threat hunting is the process of identifying unknown threats that otherwise would be hiding in your network and on your endpoints, lying in wait to further expand access and\/or steal sensitive [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":797,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/796"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=796"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/796\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/797"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}