What is ThreatHunting?
• Proactive search for hidden cyber threats.
• Goal: Detect & stop threats before damage.
• Example: Detecting malware like 'Snake
Keylogger' used in phishing campaigns.
3.
Threat Hunting inSimple Terms
• Analogy: Like an investigator searching for
intruders beyond security cameras.
• Example: Hackers bypass firewalls using 'Living
off the Land' techniques; hunters find hidden
traces.
4.
Why is ThreatHunting Important?
• • 70% of cyber threats bypass security.
• • Attackers remain undetected for months.
• • Essential for stopping ransomware & insider
threats.
• • Example: Recent 'BlackCat' ransomware
attacks targeting enterprises.
5.
Pros & Cons
•✅ Pros: Early detection, fewer false positives,
better security.
• ❌ Cons: Requires skills, time, and continuous
monitoring.
• • Example: Successful detection of 'Cobalt
Strike' misuse before an attack.
6.
Who is Affected?
•• Technical: SOC analysts, incident response,
IT teams.
• • Business: Executives, risk management, legal
teams.
• • Example: A company's CFO targeted by
'Business Email Compromise (BEC)' scams.
7.
Key Steps inThreat Hunting
• 1. Set Objectives: What threats to detect?
• 2. Gather Data: Logs, network traffic, endpoint
info.
• 3. Use Threat Intel: Leverage MITRE ATT&CK.
• 4. Analyze & Detect: Behavior patterns,
anomalies.
• 5. Automate: AI & ML for efficiency.
• • Example: Identifying 'ProxyShell' exploits in
Microsoft Exchange servers.