Database swells
Hunting for swells in database read volume
Many attackers are after data!
Enabling database auditing
In order to threat hunt using data from the database, it's necessary to have database auditing enabled
Detecting database read volume swells
Hunting for unexpected patching of systems
Many vendors offer automated patching and updating services for their products
Disabling security
Most operating systems have built-in security features
Infecting processes
Malicious patches are one way that malware authors can perform attacks like DLL hijacking
Ensuring control
A more common use of malicious patching by modern malware is to ensure control of the compromised system
Detecting malicious patches
When searching for malware performing unexpected updates, the threat hunter should ask several questions:
Additional resources
Cyber-threat hunting
Last updated