While manufacturers may use antivirus software to protect their systems from known malware forms, some attackers are not detected. Threat Hunting is a process where cyber threat hunters will actively search for attackers hiding within a network.

Cyber threat hunters will look over the system and the devices on the network for Indicators of Compromise (IoCs) during a threat hunting engagement. IoCs are clues for how a threat actor communicates to compromised devices and what changes have been made to them to aid the cybercriminal in their efforts.

Indicators of Compromise are found by analyzing network traffic, analyzing devices for recent changes in settings, and looking at login logs to detect abnormal login attempts. Cyber threat intelligence is used to help verify IoCs, cyber threat hunters, and endpoint security products.

Cyber threat intelligence is an elaborate list of known IP addresses, IoCs, attack styles, and known configurations that hackers and cybercriminals use to compromise and launch attacks. While there are various finding IoCs, the easiest way is to analyze network traffic for unusual behavior, odd port usage, and perfectly timed repetitive web traffic.

Hunting for cyber threats

While businesses use antivirus software to protect their systems from known cyber threats, they do not understand that cyber threats still exist. Cyber threat hunters help companies discover advanced persistent threats (APTs) and other stealthy threats through a process called cyber threat hunting. This article will cover what cyber threat hunting is, understand what indicators of compromise are, discuss how analysts use cyber threat intelligence, and give examples of where you can find signs of a potential threat actor.

Business professional looks through vulnerable networks.Cyber threat hunting can help reveal hidden vulnerabilities that allow hackers to conduct malware operations and large-scale data breaches.

What is cyber threat hunting?

Cyber threat hunting is the process of actively searching for malware or attackers that are hiding within a network. Cybersecurity solutions such as antivirus software and firewalls help protect systems from hackers’ known attack methods. Threat hunting is a supplementing technique that focuses on identifying sneaky footholds within the network that attackers can hide and not focus on existing vulnerabilities.

During a threat hunting engagement, cyber threat hunters will use various tools to look for what are known as indicators of compromise (IoCs). Think of IoCs as the clues that help a detective solve a case. IoCs help paint a picture detailing what a hacker is doing and what the attacker has done to hide their tracks. Threat hunting occurs after a security breach has occurred and is performed toward the end of the incident response.

Where to find common Indicators of Compromise?

Analysts will often focus on three areas during a threat hunting engagement. The first area that the analysts will look for clues of hidden attackers is what is happening on the business’s network level.

Cyber threat hunters will look at the network traffic and configuration to see any irregularities. One standard method used is session packet recordings, where the analyst inspects the contents of packets sent across the network. Session packet recordings also provide real-time information on how an attacker passes the commands and files in and out of the network.  Focusing on this area can help the security teams understand how attackers access the system and communicate with compromised machines.

The next area that analysts will focus on a threat hunting engagement is the hosts and any logs containing any changes to the settings or files on those systems. Recent changes to a system’s settings can also help the analyst understand what the attacker changed on systems found on the network and identify what files were accessed. The final common area that cyber threat hunters will investigate are the artifacts and log files of logins and login attempts. If an attacker has gained access to a privileged account, it is essential to immediately suspend it and review what actions and changes have occurred.

In some cases, an administrative or privileged account can discreetly distribute malware. Due to privileged accounts having individual permissions, there is a lower chance of any red flags being noticed.  While these are common IoC locations, no two threat hunting engagements are the same.

Cyber Threat Intelligence: Knowing is half the battle.

Beyond knowing where to look on the local network, cyber threat hunters also need to understand the landscape of what websites and IP addresses are considered harmful. This information is often called cyber threat intelligence. Cyber threat intelligence consists of an elaborate list of non-reputable IP addresses and identifiable trends such as actors, tools, and tactics used in past attacks.

To protect a network, analysts also use cyber threat intelligence to secure the systems better. System administrators and security teams use cyber threat intelligence to block known malicious IP addresses and create specific policies for devices on the network to prevent threat actors from making device settings changes. Some advanced endpoint protection services often use various cyber threat intelligence sources to improve the effectiveness of the product’s function.

What are TTPs?

When performing cyber threat hunting assessments, cyber threat hunters will compare the indicators of compromise to known TTPs. TTP is an acronym that describes the Tactics, Techniques, and Procedures typically associated with a cybercriminal group.

  • Tactics cover the tools used to initially breach or perform any action to the target network.
  • Techniques include the attacker’s methods to perform actions against the network devices.
  • Procedures are the attacker’s steps to perform a function on the network or device.

Cyber threat hunters often compare IOCs to known attack TTPs. Many TTP models, such as the Mitre ATT&CK model, cover numerous known attacks and breach behaviors over the 12 phases of a cyber attack. These TTP models are helpful to security teams in two ways. First, TTP threat models help provide a background to understand the breach better. Second, TTP models offer insight into how the analyst can safely remove and prevent the threat from reaccessing your network.

Cybercriminal attempts to breach the network of an American manufacturing firm.Keeping track of third-party application performance and outbound traffic can help manufacturers identify potential IoCs.

How can I identify potential Indicators of Compromise?

One of the best ways to identify potential IoCs is to review network traffic logs for unusual outbound network traffic. In many cases, firewalls are reliable for blocking network traffic from unknown or untrusted sources. However, if a device within the network is compromised, this change in network traffic directly affects how the firewall will operate.

Misconfigured firewalls sometimes trust outbound communication due to the connection’s origin starting internally. When reviewing outbound traffic logs, look for web addresses containing misspelled names or geographical irregularities. Also, look for unusual outbound network traffic during odd hours or web traffic that use odd port numbers. Web traffic during non-operating hours is an excellent example of an IoC.

Foreign ports used for outbound traffic can result from an untrusted or unknown process running on your devices. One last method that can help identify IoCs when looking at network traffic is to identify web traffic precisely at a given time. Repetitive traffic can indicate that a device is communicating back to the cybercriminal. Other methods of identifying IoCs can include the following:

  • Login red flags
  • Increases in database read volume
  • Bundles of data in the wrong place
  • Suspicious registry or system file changes

If you suspect that you may be affected by a silent cyber threat, we can either confirm your suspicions or put you at ease. Our team can comb your network to identify suspicious traffic and hidden risks.

As manufacturing companies invest in smart manufacturing, data analytics, web applications, and work from home models, businesses increase their loss exposure. Leadership teams need to be empowered with greater certainty that their company and its employees are safe from cybercrime organizations that seek to harm.

The lack of strategy to focus on essential asset protection priorities creates much confusion for leadership teams, so time and money are misallocated. The lack of oversight means limited accountability and diminished results for the time and money invested.

As a proud supporter of American companies, Certitude Security® is working diligently to inform leaders and facilitate essential asset protection priorities for manufacturers and supply chains throughout the United States.

Problem discussions can be a defining moment in your career. If you are interested in value creation, learn about SPOT-Beam™ by Certitude Security®. We look forward to helping you and your business succeed!