Entity-driven hunt scenario

Your organization may be part of information sharing distribution list that includes different entities in your sector

Different financial institutions may be experiencing an attack (could be phishing or DDoS), and they share details about the attack in the distribution list

Purpose

Suppose you received information that different financial institutions are experiencing Microsoft Password expiration-themed phishing campaigns

You are provided certain information regarding the senders, subject and URLs

The purpose of this entity-driven threat hunt would be to identify if your organization is experiencing this phishing campaign or has experienced it already

Scope

You review the indicators of attack used by the phising campaign to determine the scope

Here are some of the indicators used by the campaign:

  • Subject: Password expiration reminder

  • Sender: admin@xxxx.com where xxxx stands for the evil domain

  • URL: xxx.evildomain.net

  • Body: Password for your account expires today, act immediately!

Determine what techniques/tools you would focus on

Identify data that is needed for the hunt at a high level, based on the techniques/tools in scope

Hypothesis development

  • Based on information gathered, you should identify the tool needed for your hunt

  • The analytic question is if your organization is targeted by this campaign, there would be influx of emails with the associated indicators

  • Expected outcome is to be able to prove the hypotheses by locating the emails in your environment

Formulate

The hunter should formulate a plan to conduct the hunt, based on the scope

Identify data sources needed for the hunt, based on the hypothesis

  • You need email gateway logs to identify emails from the phishing campaign into your environment and determine if they were successfully delivered

  • You need proxy logs to identify URLs/domains visited based on user clicks and the associated status of where the request is allowed/blocked

  • Logs from email security solutions to identify if the email was detected as phishing

Determine analysis techniques needed to answer questions from the hypothesis

  • You need a searching techniques to look for the artifacts

Understand the tools required to gather and analyze data

  • You need an email gateway that routes your inbound email

  • A proxy solution is needed to log the URL visits

  • Email security solution

Execute

After planning, the hunter should execute the hunt by collecting and analyzing relevant data to answer questions from the hypotheses

Gather data from all the sources identified in the previous stage:

  • Email gateway logs

  • Proxy logs

  • Email security solution logs

Utilize analysis techniques to prove or disprove hypotheses:

  • Search email gateway logs for the sender/subject/URL

  • Search proxy logs to identify URLs/domains visited by end users and if the site was successfully presented to the user

  • Search email security logs to determine if the email was flagged as suspicious and blocked before delivery or removed from end user mailboxes post-delivery

Employ additional tools/techniques/data sets as needed

  • Identify if any additional data is required for analysis of if any other tools are required to capture aditional data

  • For example, the sender may have changed the sender address or the URL for your organization

  • You may have different proxy solutions that you need to gather data from for complete coverage

Capture results as you proceed with hunt

  • As you are done reviewing each indicator, document the results

  • If there any challenges, identify and document them

Develop threat hunt report that captures all essential details of hunt along with any additional observations

  • Summarize findings for each analytic question from the hypotheses

  • Outline results from each data set analyzed

  • Document any gaps identified that limited your ability to gather or analyze data

Feedback

Identify lessons from each stage of the hunt to use in the feedback stage to improve the hunting process

Involve all parties from the hunt and seek their feedback for the different stages

  • How valuable was the crowd-sourced data that was used as a trigger for the hunt?

  • Were there any additional data elements that could have been gathered?

  • What could we improve for each stage of the hunt?

  • Did we select the right indicators to focus on in t he scope stage?

  • Did we consider all data sources for analysis?

  • Were there any deviations in logging?

  • Were there any tools that we were missing to collect and analyze data?

Last updated