Unstructured hunting

This is the most common form of threat hunting that is observed in many organizations that have some form of threat hunting capabilities

  • There is no specific methodology defined to conduct hunts and this doesn't rely on TTPs for hunts

  • Instead, this type of threat hunting primarily relies on analyst intuition and IOCs to drive hunts

  • There are many sites that share threat reports and IOCs associated with a specific threat for free

  • Organizations may have paid sources that provide threat intelligence to obtain the latest threat reports/IOCs when they have them

There are multiple schools of thought for unstructured hunting

  • The first one is that unstructured threat hunting starts from a trigger or an indicator of compromise (IOC)

  • The hunter searches the network for malicious patterns before and after the trigger or IOC

  • Threat hunters can investigate historical data as far as data retention limits permit

  • This type of threat hunting can discover new types of threats or threats that penetrated the environment in the past and are now dormant

  • In the next section, we will talk about cyber-threat intelligence as it is primary source for threat hunting

Cyber-threat intelligence

What is cyber-threat intelligence (CTI)?

A collection of data regarding threats:

  • Organizations may collect intelligence for internal use

  • Some companies collect and sell threat intelligence, both directly and through the purchase of security platforms

  • There are commercial and open-source threat intelligence source available

  • There are also Information Sharing and Analysis Centers (ISAC) that collect, analyze and disseminate actionable threat information to its members

  • There are ISACs for various industries like financial, industrial, etc, that organizations can be part and obtain valuable intel. Sometimes they acquire real-time intel that can be used to mitigate risks

Open-Source Intelligence (OSINT)

Cyber threat information which is collected/shared publicly

  • Open-source intelligence can be used on its own

  • OSINT can be combined with threat data collected by an organization

Commercial threat intelligence

Cyber-threat information is provided by many security vendors for a fee and provides the following advantages over OSINT

  • Visibility - The level of coverage is broader and more expansive than what a select open-source community can focus on, providing you with more holistic threat intelligence and enabling you to be more proactive, rather than reactive, with your security actions

  • Triage - It can provide severity levels for IOCs and related alerts, which can help you triage and focus on what's most important for your team to address

  • Context - This provides more intelligence context to know what action you need to take next when you see an alert within your dev environment or identify a specific vulnerability

Another school of thought is analyst intuition

  • It is defined as a method of finding malicious activity without knowing exactly what type of threat you are looking for

  • Instead, the hunter relies on behavioral analysis to find these threats

  • In short, unstructured hunting is investigative work where a cyber-threat hunter observes behavior and looks for anomalies

  • For example, if someone sends out spam emails, a system administrator might notice unusual activity on his network and investigate further

  • If he finds something suspicious, he could act immediately or wait a few days to see if the same email addresses start sending again

Last updated