Cyber threat hunting is a proactive approach to identifying and mitigating cyber threats lurking undetected in an organization's IT environment. As a complement to threat monitoring that alerts security and operations teams to a known attack or incident, threat hunters actively seek and root out dangers such as malicious actors and ransomware code that successfully evade traditional security tools to infiltrate an organization’s digital business. In the process, these threat-hunting cybersecurity experts—who often work in a security operations center (SOC)—take measures to shore up their organizations' cyber resilience by preventing bad actors from compromising networks, systems, devices, and data while identifying new potential threats and vulnerabilities.
Because many sophisticated cyber threats and attacks can effectively evade common security tools, threat hunting is necessary to ensure an organization's cyber resilience and ransomware readiness. Skilled cybercriminals are continuously looking for weaknesses to exploit so they can penetrate an organization. Once successful, they can access data and login credentials to move laterally—and covertly—across an organization’s IT operating environment. To protect against worst-case scenarios, threat hunting practices unearth and mitigate cyber threats and bad actors that can effectively evade products such as firewalls and antivirus software.
In addition to proactively reducing the likelihood of a successful attack and associated damages including financial, productivity and brand reputation losses, threat hunting helps organizations:
Cyber threat hunting has two primary goals: to proactively identify and to stop hidden threats and attacks before they cause downtime, negatively impacting revenue, employee productivity, and customer satisfaction. According to the SANSTM Institute, “threat hunting is predominantly a human-based activity in looking for incidents that our automated tools have not yet found or cannot yet detect.” The most successful threat hunters search for indicators of compromise (IoCs) which can include irregular network traffic, abnormal user or application behaviors, and malware-specific actions.
Threat hunting is typically characterized in the following ways:
The most effective cyber threat-hunting practices include the following core steps:
Considering that security teams see hundreds—even thousands—of alerts every day, they are stretched thin when it comes to investigating and mitigating cyber threats. Their time constraints are further exacerbated by the manual process to hunt for and validate threats and attacks calling data from multiple tools. Integrated IT operations and security tools can reduce manual efforts while providing greater visibility into the organization’s cybersecurity stance.
For example, a modern backup and recovery platform can work seamlessly with security solutions ranging from security orchestration, automation, and response (SOAR) to security information and event management (SEIM) systems to automate threat hunting. Tighter integration makes it possible for teams to:
The right technology solutions will also enhance typical cyber threat hunting techniques and steps which include:
While threat hunters follow a prescribed method to surface, investigate, and mitigate threats, threat intelligence provides insight into threat trends and threat actors’ behaviors, techniques, motives, and capabilities. Simply put, threat intelligence empowers security teams—including threat hunters—to prepare for, respond to, and even prevent attacks.
Since cyber threat hunting is focused on analyzing all available data to spot vulnerabilities and correlations, threat intelligence is an invaluable resource. With it, threat hunters can gain insights about potential and current cyber threats that make it possible to stop cybercriminals before they successfully compromise systems or data.
Both threat hunting and threat intelligence can help organizations improve their cyber resilience.
Threat monitoring is the practice of organizations relying on standard security tools to discover and alert about potential threats while threat hunting counts on human experts to discover and mitigate them before they cause damage. Threat hunters search for threat and attack patterns that often elude traditional security tools. Yet both threat hunting and threat monitoring are actions that can help empower organizations to boost their cyber resilience.
To combat the growing sophistication and determination of today’s cybercriminals, organizations need to take every measure to keep their sensitive data secure. To that end, a proactive threat hunting approach supported by modern digital technology is a core component of a cyber resilience strategy. Organizations using our platform, Cohesity Data Cloud, together with Cohesity DataHawk and Cohesity Security Advisor, can empower their ITOps, SecOps, and NetOps teams with a range of capabilities including immutable snapshots, AI-driven data insights, data classification, and more, to support threat hunters in their missions to identify and thwart data-centric threats.
With Cohesity solutions, cyber threat hunters have the tools they need to:
The Cohesity platform also supports seamless integrations with Data Security Alliance partners and leading security vendor applications. Working in concert, these capabilities and integrations enable threat hunters to better protect their organizations’ data from theft and ransomware by detecting attacks in progress and preventing attacks from tampering with or destroying data.
Learn more about Cohesity threat protection and detection.
Enjoyed your demo? Experience the power of cloud backup and recovery—free for 30 days.