This is the second installment in a three-part series on threat hunting. Be sure to read Part 1 and Part 3 for more information.

A threat hunting program can provide an accurate picture of where your organization is exposed to threats and help security professionals strengthen those weaknesses. If you know how an adversary is breaking into your environment, you can improve your defenses and stop attacks from happening again in the future. This echoes the importance of having accurate and up-to-date metrics gathered through continuous threat hunting. Remember: Prevention is ideal, but detection is a must.

Protecting the C-Suite

Modern threats are just as advanced as they are persistent. Traditional attacks randomly select targets looking for vulnerabilities. Modern threats actively target their victims for acutely specific purposes. Sensitive, critical and proprietary data is fair game. To make matters worse, fraudsters are increasingly taking aim at C-level executives, locking in on the most important people and data in your organization.

Imagine that your CEO works from a desktop in the office, a laptop at home, and both a tablet and a phone when traveling. What are the odds that one or more of those devices has some sort of sensitive or proprietary data on it? It is critical to the continuity of your organization that you take necessary security measures before that data can be breached. No company wants to be the feature of the week in a news article, which is why threat hunting is a necessary exercise.

Plan for the Worst, Hope for the Best

One of the key maxims of security is to plan for the worst and hope for the best. In other words, it is better to assume that you are compromised than to assume that you are not. While this level of paranoia would inhibit you in your normal life, it can be a great help in your security career because it promotes a proactive security mentality.

Unfortunately, many organizations learn that they have been compromised through a third party. Often it is a regulating body such as law enforcement or another legal agent that brings the breach to the victim’s attention. If you are asleep in your bedroom while your home is broken into but you don’t find out until you hear sirens outside, your security has totally and completely failed you. Ideally, you would want an alarm to go off as soon as an entry point into your home was compromised, but you would also want to make sure that doors and windows were locked. You do not want to make it easy for an intruder to enter your home.

Similarly, you need to perform threat hunting and proactive security — disabling unnecessary ports, protocols and services — to make it harder for intruders to get into your network.

Tailoring Your Threat Hunting Model

With the introduction of social media, cloud and bring-your-own-device (BYOD) programs, your organization’s footprint has most likely increased exponentially. For most organizations, data is scattered over several mediums and platforms. Actively identifying the weaknesses in the areas where your data is stored is critical to identifying where your resources need to be allocated.

While threat modeling should be tailored to the specific needs of your organization, there are a few basic steps that all threat hunters should take:

  • Determine the scope of the threat.
  • Conduct asset valuation and an impact analysis.
  • Address threats by order of likelihood.
  • Arrange vulnerabilities hierarchically.
  • Examine the threat history.
  • Devise an incident response plan.

Dwelling on Dwell Time

Some of the biggest value adds of threat hunting include reducing your attack surface, minimizing your exposure to threats and better managing of security incidents. Of particular importance is a reduction in dwell time, or the amount of time an adversary is within your organization. The difference between an attacker exfiltrating information from your organization for six days and six months could be the difference between folding and staying in business.

Listen to the podcast: The Art of Cyber Threat Hunting

More from Network

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges

4 min read - View Part 1, Introduction to New Space, Part 2, Cybersecurity Threats in New Space, and Part 3, Securing the New Space, in this series. After the previous three parts of this series, we ascertain that the technological evolution of New Space ventures expanded the threats that targeted the space system components. These threats could be countered by various cybersecurity measures. However, the New Space has brought about a significant shift in the industry. This wave of innovation is reshaping the future…

4 min read

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

4 min read - Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

4 min read

Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in New Space

7 min read - View Part 1 in this series, Introduction to New Space. The growth of the New Space economy, the innovation in technologies and the emergence of various private firms have contributed to the development of the space industry. Despite this growth, there has also been an expansion of the cyberattack surface of space systems. Attacks are becoming more and more sophisticated and affecting several components of the space system’s architecture. Threat Actors' Methodology Every space system architecture is composed of three…

7 min read