IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

What is threat hunting?

Although most threats can be dealt with automatically, the tougher ones require a bit more investigation

When it comes to cyber security defences, organisations need to take a proactive stance. Simply relying on automated security systems or artificial intelligence (AI) powered tools isn’t good enough, and businesses need to actively seek out the threats that endanger them. This is where threat hunting comes into play.

Cyber security threat hunting involves organisations proactively discovering advanced threats that are hard to detect using automated security software. This type of activity is used to find the higher level hackers, such as state-backed ransomware gangs. 

The types of threats businesses need to seek out themselves are also more covert and persistent. These threats will secure a far stronger grip in corporate networks for longer periods, too, so as not to cause substantial disruption that automatic security systems can detect. Threat hunting is the answer – with cyber security experts across the world manually seeking out the most notorious cyber security risks. 

Why does threat hunting matter?

On average, companies take roughly 197 days to find cyber security threats, and approximately 69 days to contain a breach, according to IBM. Such delays can be highly costly to businesses. According to the company’s research, a data breach could cost a company almost $4 million. Hunting for cyber threats is important because, while many threats are caught by an organisation’s automated security defences, the more sophisticated threats will inevitably pass through. 

Automated tools and analysts working in security operations centres can deal with the great majority of normal threats. This leaves a significant chunk of threats, though, that still might give chief information security officers (CISOs) or other c-suite level tech leaders a reason to stay up at night. 

An effective threat hunting strategy can cut down on the time between intrusion and discovery, which alleviates the pressure while adding an additional layer of protection

How does threat hunting work?

Cyber security threat hunting works on the assumption that an organisation is already breached and that hackers are inside the network, monitoring it and moving around. 

To combat this, cyber threat hunters monitor the average activities and traffic that run across a network to find malicious activities that could lead to a full-scale breach.

To achieve this, an organisation must have a full-time approach to threat hunting. Just doing it “as and when” will not yield significant results and can be self-defeating. 

Technology also plays a part in the form of data collection. Enterprises will have security systems that collect data and threat intelligence. This is a crucial part of threat hunting as, without it, such activities can be ineffective.

What are the leading threat hunting methodologies?

Many threat hunters assume a hacker has already infiltrated the IT infrastructure. Investigations, therefore, begin in order to figure out where they might be lurking by looking for strange behaviour that may imply the incidence of malicious activity. When threat hunting in this proactive manner, these investigations fall into three categories.

Hypothesis-driven probes

This type of investigation is frequently prompted by a newly identified threat being brought to the surface from a large array of crowdsourced attack data, giving insights into a hacker’s latest tactics, techniques, and procedures (TTP). Once this has been acknowledged, threat hunters will then look to ascertain if the hackers’ particular behaviours are found in their own infrastructure.

Known markers of compromise or attack

This threat hunting method involves using tactical threat intelligence to list indicators of compromise (IoCs) and indicators of attack (IoAs) related to new threats. This can activate an investigation by a threat hunter to unearth possible covert attacks or continuing malicious activity.

Advanced analytics and machine learning 

This method brings together data analytics and machine learning to trawl through huge amounts of data to spot anomalies that may imply possible malicious activity. These irregularities can help in starting off investigations that information security analysts can make to find surreptitious threats.

Threat hunting best practices

There are several recommendations that threat hunters normally follow to ensure they’re as successful as possible when seeking out threats.

Set a baseline standard of normal activity: Threat hunters can only find anomalies when they know what is normal. Thus, hunters must know all aspects of the organisation’s infrastructure. This includes architecture, communication flows, and user rights. If few users normally use a specific function in an organisation but there is a lot of traffic to this function, this could signify an attack.

Related Resource

An analysis of the European cyber threat landscape

Human risk review 2022

Whitepaper cover with title and three colleagues sat at a table laughing togetherFree Download

Make sure threat sources are up to data: Obvious threats will already be blocked by existing security solutions. Threat hunters should be looking for zero-day exploits and attacks that combine several tactics, such as an injection attack coupled with account compromise.

Use automation and existing tools to be more effective: Threat hunting needs people to be creative in their thinking but automation and existing security tools can cut out a lot of manual work, leaving analysts to concentrate on the less prosaic threats.

Using feedback to improve future hunting outcomes: Whether or not a hunter finds a threat, the process should be documented, and evidence collected. This can help enhance the organisation’s security systems and practices. It can also be used to improve security protocols. Hunting processes should be assessed and developed to ensure better success rates in future hunts.

Who are cyber threat hunters?

Threat hunters are typically cyber security professionals that know an organisation’s operations and systems and can trawl through security data to protect infrastructure. They look for hidden malware attacks, backdoors and malicious actors as well as search for dodgy patterns and activities within the organisation’s daily functions to identify all types of threats. When a threat is identified, threat hunters can help in patching systems to prevent similar attacks in the future from happening.

What qualifications do threat hunters need?

Cyber threat hunters are much in demand, and suitable qualified personnel are few and far between. To become a cyber threat hunter, people need a background in cyber security and have hands-on experience in such areas as forensic science, data analysis, intelligence analysis, malware reversing, network and endpoint security, adversary tracking, and other security-related skills.

They need to understand the makeup of the cyber security landscape and have a deep knowledge of current and past malware methods, attack methodologies, and TTPs. They also need a good knowledge of operating systems, including Windows and Linux systems, as well as a solid understanding of how different network protocols work, such as TCP/IP. Finally, threat hunters should be fluent in a scripting language, such as Python.

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
Google is now spending a staggering amount on blockchain
Business strategy

Google is now spending a staggering amount on blockchain

17 Aug 2022
UK water supplier confirms hack by Cl0p ransomware gang
ransomware

UK water supplier confirms hack by Cl0p ransomware gang

16 Aug 2022