TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Breaking Down the Threat Hunting Process | Huntress

2023-08-02 · Read original ↗

ATT&CK techniques detected

6 predictions
T1595Active Scanning
39%
“just like the attacker ’ s workflow, threat hunting usually kicks off with some reconnaissance. most commonly, this is determined by identifying risk areas or looking at historical data to specify the patterns and potential threats to hunt down. this can also come from various ou…”
T1593Search Open Websites/Domains
36%
“ring, threat hunters take the initiative to track down adversaries that might be in their environment. it heavily relies on human expertise and the ability to think like the adversary. typically, the goal of any threat hunt can include one ( or more ) of the following : - find ma…”
T1595Active Scanning
35%
“breaking down the threat hunting process | huntress in the ever - changing cyber landscape, new threats emerge daily, testing the resiliency of businesses worldwide. to effectively stay ahead of these threats, many businesses are turning to threat hunting, the discipline of proac…”
T1595Active Scanning
34%
“rules that can alert on that activity in the future. - improve process : because threat hunting is an iterative process, there ’ s always an opportunity to create a feedback loop and look for areas for improvement — in both the hunting process and the organization ' s security po…”
T1595Active Scanning
32%
“ring, threat hunters take the initiative to track down adversaries that might be in their environment. it heavily relies on human expertise and the ability to think like the adversary. typically, the goal of any threat hunt can include one ( or more ) of the following : - find ma…”
T1595Active Scanning
31%
“expected threat activity they ’ re looking for and the general direction their hunt will go in. unstructured hunting is more freestyle, allowing threat hunters to be guided by their curiosity. there are no strict guidelines, and they explore rabbit holes or work off of hunches or…”

Summary

Discover the key phases of the threat hunting process and how threat hunters structure their hunts to proactively seek out threats.