Prelude
The purpose of this article is to give the reader the overview of a threat hunting method. Also how to fit threat hunting in SOC.
I am a little bit paranoid and my question to the reader is:
How do you know that you have not been hacked?
Definition
The goal of threat hunting is to provide proactive opportunity to uncover attacker presence in an environment.
Threat hunting is sitting in the middle of the Incident Response tetragon.
Preparation
Detection and Analysis
Containment, Eradication, Recovery
Post-Incident Activity
Hypothesis-driven investigation
Kill Chain Analysis And Mitre Att&ck
I am not going into the details of the Cyber Kill Chain, but with Mitre Att&ck, we are able to categorizing tacticts and techniques for different adversaries; therfore defenders can identify attack behaviors that might fit into a given stage of each model.
With Threat Intelligence we are able to analysie potentional adversaries for our industry. Than we start to hunt these techniques with our IR/Threat Hunt team.
Example
Lets say that company_A is in the banking sector. With threat intellingence we collect the APTs/adversaries TTPs, who are “working” in this financial sector.
One actor is Scattered Spider. In mitre we can see what tactics/techniuques they use.
![](https://static.wixstatic.com/media/af9495_30b062ab959840df9f23ae0c6ed5e595~mv2.png/v1/fill/w_454,h_218,al_c,q_85,enc_auto/af9495_30b062ab959840df9f23ae0c6ed5e595~mv2.png)
Scattered Spider Tactics and Techniques
Our threat hunters start to hunt these techniques with custom scripts, SIEM filters, host-, network- and memory forensics and unitlize with mitre d3fend framework. We can use Sigma rules for detection for these special techniques.
For example presistence, account manipulation: Cloud accounts:
![](https://static.wixstatic.com/media/af9495_a0891c5ee32f42d6a09ff7c06d2954d1~mv2.png/v1/fill/w_454,h_239,al_c,q_85,enc_auto/af9495_a0891c5ee32f42d6a09ff7c06d2954d1~mv2.png)
Cloud Accounts
In blue color we can see the countermeasures, in yellow color the artifact. We have to check all the countermeasuers, that do we apply these in our environment?
Conclusion
Hypothesis-driven investigation is just one method of many. The investigations should be already in a reactive technique, but with threat hunting we are able to open our eyes more horizontally, and if we need we can dig deeper.