Hunting for malicious files
Hunting for filenames
Known bad filenames
Certain families of malware (especially those created using kits) have known or predictable filenames
File extensions
Most cybersecurity awareness training focuses on the .exe extension when teaching users about dangerous executable files
Left-to-right override
Hunting for abnormal account activity
Unusual login activity
Both successful and failed login attempts can be indicators of an attempted attack
Account-related threats to look for include:
Brute-force attacks
Brute-force attacks are some of the simplest and loudest password-guessing attacks
Credential stuffing
Credential stuffing is a slightly more sophisticated but equally loud version of a brute-force attack
These attacks work due to weak password and failure to enforce account lockout
Hunting for failed logons
Anomalies in privileged account activity
Privileged account users have a significant amount of power on an organization's endpoints and networks
Hunting for privileged account activity
An attacker may create a new account or change an existing account password to maintain persistence
Last updated