# What is cyber threat hunting?

## Security monitoring

**Cybersecurity monitoring** has traditionally been **reactive** where detections are **based on signatures/hashes/heuristic** utilized by security solutions

Use cases provide means for SOCs to detect threats based on custom correlation of suspicious activity within an organization and still be reactive in nature

A SOC analyst reviews alerts coming into a SIEM or similar solution, analyzes and responds to them accordingly

### Challenges

**Unknown threats bypass traditional security controls** and remain in the environment, sometimes until they'r noticed by an external agency

Sophisticated attackers have the tools and the skill set to bypass traditional defenses

SOC analysts may deal with **alert fatigue due to too many alerts** generated by the various security solutions

**Visibility gaps** in the environment will **degrade the detection** process as you can't monitor what you can't see

## What is threat hunting?

**Threat hunting** is a proactive, rather than reactive, approach to identifying threats in an environment

It utilizes a **hypothesis-based analyst-drive approach** to identify, prioritize, execute, record and report hunts in the environment

The goal of threat hunting is to **identify potential threats** before they can cause harm, by using various techniques, methodologies and hypothesis-driven investigation

It enhances the security posture of your organization by identifying threats that are not detected through traditional avenues

### Why is it important?

Reaching an all-time high, the cost of a data breach averaged USD 4.35 million in 2022

The average time to identify and contain a data breach was **277 days**

**Proactive strategies reduce response times and fiscal impacts**:

* Organizations with XDR technologies identified and contained a breach 29 days faster than those without
* Average breach cost reductions with AI/Automated Solutions - 3.05 million
* Average breach cost reductions with incident response (IR) team and regularly tested IR plan - 2.66 million
* Average cost savings associated with zero-trust deployment - 1 million

## Who is a threat hunter?

**Cybersecurity professional** who proactively seeks to uncover threats in an environment not detected by existing detection controls

Someone who is well-versed in **security analysis** and has **domain knowledge** to distinguish normal from suspicious behavior

Uses various **threat hunting sources** to identify potential hunts, **develops a hypothesis** to **guide the hunts, executes and reports** on them

Uses various **threat hunting methodologies and techniques** to uncover threats in the environment that are not detected via existing detection mechanisms

## Threat hunting sources

Threat hunters rely on different sources of information to create hunts, such as the following:

### **Threat intelligence**

**Collection of data related to known threats and threat actors**

* Threat actors targeting your organization
* Information sharing between organizations within the same sector
* Zero-day exploits against similar organizations
* New vulnerabilities being leveraged by attackers

### **Internal finding**

The **findings identified** by various teams conducting assessments

* Internal audit
* Enterprise risk teams
* Red Team

### Security incidents

Lessons learned phase of incident response captures valuable that could be leveraged by threat hunting. These could be tactics and techniques identified during incident response, gaps in coverage, vulnerabilities, etc

### MITRE ATT\&CK framework

Tactics and techniques outlined in the framework are great resources to identify and prioritize hunts to be conducted within your organization

### Organizational knowledge

Knowledge of known gaps, broken processes, etc derived from time spent with an organization is another great source for threat hunting

### Anomalous activity

Activity that deviates from established security configurations or behaviors in another input for threat hunting
