SlideShare una empresa de Scribd logo
1 de 23
Threat Hunting and
achieving Maturity
By Ankit Panchal
Agenda
• Introduction to Threat Hunting
• Threat Hunting Maturity Model (HMM)
• Threat Hunting Techniques
• Threat Hunting Loop
• Practical Threat Hunt Cases
Introduction to Threat Hunting
Threat Hunting Basics
• What is Threat Hunting?
It is "the process of proactively and iteratively searching through networks to
detect and isolate advanced threats that evade existing security solutions.“
• Why is Hunting Required?
 Alerting from Security systems is important, but cannot be the only focus of a
detection program.
 Primary goals of a hunting program should be to improve detection by
prototyping new ways to detect malicious activity and then turning those
prototypes into effective new automations.
There are no “one size fits all”-type solutions in threat hunting.
How many of you think that
your organization does
Threat Hunting?
Threat Hunting Maturity Model (HMM)
• At least some routine data
collection.
• Incorporate TI searches
• Hunting from central location
like SIEM
• Similar to HMM 3 but
involves
automation.
• Involves automation
of majority of data
analysis procedure.
• Threat Hunters create
procedures using their own
data analysis technique.
• Aided by Linked data
analysis, data visualization
and Machine Learning
• Follow data analysis
procedures available on
Internet.
• Most organizations with
Active Threat Hunt program
falls under this category.• Relies Primarily on automated
alerting. (e.g. SIEM, IDS/IPS)
• Alerting by Threat Indicators
fed to monitoring systems.
• At this level you cover only
the basics.
Hunting Maturity Model (HMM)
Initial
[HMM 0]
Minimal
[HMM 1]
Innovative
[HMM 3]
Procedural
[HMM 2]
Leading
[HMM 4]
Now, do you think that your
organization does some level
of Threat Hunting?
What level of threat hunting
maturity that your
organization has achieved?
Threat Hunting Techniques
• Searching
• Clustering
• Grouping
• Stack Counting
Primary Threat Hunting Techniques
• Searching is the process of querying data for specific results or
artifacts.
• Requires finely defined search criteria to prevent result overload.
Example:
Searching for IOCs for a specific exploit like Gh0stRAT.
Domain = mdzz2019.noip.cn
• Stack Counting involves counting the number of occurrences for
values of a particular type, and analyzing the outliers or
extremes of those results.
Example:
Categorizing particular kinds of outbound connections by frequency.
Benign web traffic that goes through port 80, ports 55419, 2266,
3333, and 21 which only have one connection each.
• Clustering is a statistical technique, aided by Machine Learning.
• Consists of separating groups (clusters) of similar data points based on
certain characteristics out of a larger set of data.
Example:
Multiple servers accessed by only a few machines, at a time when other
machines didn’t access these servers at all.
Port 445 access to Web Servers from few Desktops / Laptops
• Grouping consists of taking a set of multiple unique artifacts and
identifying when multiple of them appear together based on specific
criteria.
Example:
Visualize the frequency and command execution across hosts in specific
timeframe.
whoami command spawned by a script
How many of you think Threat
Hunting is a technique?
Threat Hunting Loop
Doing it the right way
Often the First Threat Hunting Result
• Why did it fail?
Because Threat Hunting is a PROCESS.
• Create a hypothesis according to Business requirements and then
follow the Hunting Loop.
Indicators from Internet
[IP / URL]
Proxy Logs
[IP / URL]
X =
Search Finished.
[0] No match Found
THREAT HUNTING LOOP
Create
Hypothesis
Investigate
via Tools and
Techniques
Uncover
new
patterns
Inform and
Enrich
Analytics
• Hypothesis:
An educated guess, about some type of activity
that might be going on in your IT environment.
• Investigate:
Discover new malicious patterns in their data and
reconstruct complex attack paths to reveal an
attacker’s Tactics, Techniques, and Procedures
(TTPs).
• Uncover:
Uncover the specific patterns or anomalies that
might be found in an investigation.
• Analytics:
Automate its detection so that your team can
continue to focus on the next new hunt.
What do you need for Threat Hunting?
You can’t hunt if you don’t have the right data, but what is the right
data?
General List of Datasets
• Endpoint Data
[E.g. Process execution metadata; Registry access data; File Data; Network Data;
File Prevalence]
• Network Data
[E.g. Network session data; Proxy logs; DNS Logs; Firewall Logs; Switch & Router
Logs]
• Security Data
[E.g. Threat Intelligence; SIEM Alerts; Friendly Intelligence]
Practical Threat Hunt Cases
Case Study I: Potential C2 Activity
• Goal: Identify potential C2 activity utilizing dynamic DNS (DDNS) that
could avoid possible detection.
• Datasets Required:
1. DNS query logs (outbound traffic)
2. Proxy logs (outbound traffic)
3. A list of dynamic DNS provider domain names (e.g. malwaredomains.com)
• Analysis Technique Used:
• Searching
• Stack Counting
• What should you look for?
1. List down the list of domains hosted on dynamic DNS (DDNS) providers (e.g.
no-ip.*; ddns.*; etc.)
2. Utilize a lookup or feed of known dynamic DNS (DDNS) domains to query
against data in a SIEM or log aggregator.
• In DNS query Logs:
1. Trace the DNS query back to the source machine inside your network
2. Determine which host made the original DNS query
• In Proxy Logs:
1. Determine the IP address that the dynamic DNS hostname resolves to
2. Determine ports/protocols communicated over
3. Determine the bytes in and bytes out
4. Determine the frequency and interval
If the results are found to be suspicious in nature:
SWITCH ON – INCIDENT RESPONSE MODE
Case Study I: Potential C2 Activity
Case Study II: Suspicious email notification
from employee which is a MalSpam
• Goal: Identify if any of the user / system in your environment has fallen
prey to Malspam
• Datasets Required:
1. Firewall logs (outbound traffic)
2. Proxy logs (outbound traffic)
3. Sandbox logs
4. Email Gateway and server logs
5. EDR Logs
• Analysis Technique Used:
• Searching
• Grouping
Case Study II: Suspicious email notification
from employee which is a MalSpam
• In Email Gateway and server logs
1. Check for all the recipients of this Malspam.
2. Check how many of them got it successfully delivered.
• In Sandbox Logs
1. Check if the email contains malicious Domains / URLs link.
2. Check for the Hash Value of the file downloaded.
3. Check the IP Address the Domain / URL resolves to.
• In Proxy Logs
1. Check if any of the user has clicked on the Domains / URLs identified.
2. Check if the payload was downloaded on user’s machine.
Case Study II: Suspicious email notification
from employee which is a MalSpam
• In EDR Logs
1. Check if the payload was successfully executed user’s machine.
• In Firewall Logs
1. Check if there was communication to any suspicious IP.
2. Check byte in and byte out to verify if there was any data exfiltration
attempt.
At any of the stage mentioned if the results confirm successful infection then immediately:
SWITCH ON – INCIDENT RESPONSE MODE
Thank You

Más contenido relacionado

La actualidad más candente

Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
Steve Lodin
 

La actualidad más candente (20)

The Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageThe Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query Language
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Hunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Threat hunting in cyber world
Threat hunting in cyber worldThreat hunting in cyber world
Threat hunting in cyber world
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules Coverage
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - GerritzBSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
 

Similar a Threat hunting and achieving security maturity

Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
Spyglass Security
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
limsh
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 

Similar a Threat hunting and achieving security maturity (20)

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Cyber threat-hunting---part-2-25062021-095909pm
Cyber threat-hunting---part-2-25062021-095909pmCyber threat-hunting---part-2-25062021-095909pm
Cyber threat-hunting---part-2-25062021-095909pm
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slides
 
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Hacking - penetration tools
Hacking - penetration toolsHacking - penetration tools
Hacking - penetration tools
 
CNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring RationaleCNIT 50: 1. Network Security Monitoring Rationale
CNIT 50: 1. Network Security Monitoring Rationale
 
Paranoia 2018: A Process is No One
Paranoia 2018: A Process is No OneParanoia 2018: A Process is No One
Paranoia 2018: A Process is No One
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
BAIT1103 Chapter 7
BAIT1103 Chapter 7BAIT1103 Chapter 7
BAIT1103 Chapter 7
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 

Más de DNIF

Más de DNIF (16)

Beyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspectiveBeyond blacklists - A cyber threat intelligence perspective
Beyond blacklists - A cyber threat intelligence perspective
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
 
Threat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATION
Threat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATIONThreat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATION
Threat Intelligence and Cyber Security Challenges | KASPERSKY & DNIF INTEGRATION
 
CVE Analysis using vFeed
CVE Analysis using vFeedCVE Analysis using vFeed
CVE Analysis using vFeed
 
Container Security Essentials
Container Security EssentialsContainer Security Essentials
Container Security Essentials
 
Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed Importance of having a vulnerability management | Vfeed
Importance of having a vulnerability management | Vfeed
 
Anatomy of Persistence Techniques & Strategies to Detect
Anatomy of Persistence Techniques & Strategies to DetectAnatomy of Persistence Techniques & Strategies to Detect
Anatomy of Persistence Techniques & Strategies to Detect
 
User Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine LearningUser Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine Learning
 
Process Whitelisting With VirusTotal
Process Whitelisting With VirusTotalProcess Whitelisting With VirusTotal
Process Whitelisting With VirusTotal
 
VirusTotal Threat Intelligence and DNIF Use Cases
VirusTotal Threat Intelligence and DNIF Use CasesVirusTotal Threat Intelligence and DNIF Use Cases
VirusTotal Threat Intelligence and DNIF Use Cases
 
Kaspersky Threat Intelligence Portal and DNIF Use Cases
Kaspersky Threat Intelligence Portal and DNIF Use Cases Kaspersky Threat Intelligence Portal and DNIF Use Cases
Kaspersky Threat Intelligence Portal and DNIF Use Cases
 
Data Analytics in Cyber Security
Data Analytics in Cyber SecurityData Analytics in Cyber Security
Data Analytics in Cyber Security
 
Mastering Next Gen SIEM Use Cases (Part 3)
Mastering Next Gen SIEM Use Cases (Part 3)Mastering Next Gen SIEM Use Cases (Part 3)
Mastering Next Gen SIEM Use Cases (Part 3)
 
Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Threat hunting and achieving security maturity

  • 1. Threat Hunting and achieving Maturity By Ankit Panchal
  • 2. Agenda • Introduction to Threat Hunting • Threat Hunting Maturity Model (HMM) • Threat Hunting Techniques • Threat Hunting Loop • Practical Threat Hunt Cases
  • 4. Threat Hunting Basics • What is Threat Hunting? It is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.“ • Why is Hunting Required?  Alerting from Security systems is important, but cannot be the only focus of a detection program.  Primary goals of a hunting program should be to improve detection by prototyping new ways to detect malicious activity and then turning those prototypes into effective new automations. There are no “one size fits all”-type solutions in threat hunting.
  • 5. How many of you think that your organization does Threat Hunting?
  • 7. • At least some routine data collection. • Incorporate TI searches • Hunting from central location like SIEM • Similar to HMM 3 but involves automation. • Involves automation of majority of data analysis procedure. • Threat Hunters create procedures using their own data analysis technique. • Aided by Linked data analysis, data visualization and Machine Learning • Follow data analysis procedures available on Internet. • Most organizations with Active Threat Hunt program falls under this category.• Relies Primarily on automated alerting. (e.g. SIEM, IDS/IPS) • Alerting by Threat Indicators fed to monitoring systems. • At this level you cover only the basics. Hunting Maturity Model (HMM) Initial [HMM 0] Minimal [HMM 1] Innovative [HMM 3] Procedural [HMM 2] Leading [HMM 4]
  • 8. Now, do you think that your organization does some level of Threat Hunting?
  • 9. What level of threat hunting maturity that your organization has achieved?
  • 11. • Searching • Clustering • Grouping • Stack Counting Primary Threat Hunting Techniques • Searching is the process of querying data for specific results or artifacts. • Requires finely defined search criteria to prevent result overload. Example: Searching for IOCs for a specific exploit like Gh0stRAT. Domain = mdzz2019.noip.cn • Stack Counting involves counting the number of occurrences for values of a particular type, and analyzing the outliers or extremes of those results. Example: Categorizing particular kinds of outbound connections by frequency. Benign web traffic that goes through port 80, ports 55419, 2266, 3333, and 21 which only have one connection each. • Clustering is a statistical technique, aided by Machine Learning. • Consists of separating groups (clusters) of similar data points based on certain characteristics out of a larger set of data. Example: Multiple servers accessed by only a few machines, at a time when other machines didn’t access these servers at all. Port 445 access to Web Servers from few Desktops / Laptops • Grouping consists of taking a set of multiple unique artifacts and identifying when multiple of them appear together based on specific criteria. Example: Visualize the frequency and command execution across hosts in specific timeframe. whoami command spawned by a script
  • 12. How many of you think Threat Hunting is a technique?
  • 13. Threat Hunting Loop Doing it the right way
  • 14. Often the First Threat Hunting Result • Why did it fail? Because Threat Hunting is a PROCESS. • Create a hypothesis according to Business requirements and then follow the Hunting Loop. Indicators from Internet [IP / URL] Proxy Logs [IP / URL] X = Search Finished. [0] No match Found
  • 15. THREAT HUNTING LOOP Create Hypothesis Investigate via Tools and Techniques Uncover new patterns Inform and Enrich Analytics • Hypothesis: An educated guess, about some type of activity that might be going on in your IT environment. • Investigate: Discover new malicious patterns in their data and reconstruct complex attack paths to reveal an attacker’s Tactics, Techniques, and Procedures (TTPs). • Uncover: Uncover the specific patterns or anomalies that might be found in an investigation. • Analytics: Automate its detection so that your team can continue to focus on the next new hunt.
  • 16. What do you need for Threat Hunting? You can’t hunt if you don’t have the right data, but what is the right data? General List of Datasets • Endpoint Data [E.g. Process execution metadata; Registry access data; File Data; Network Data; File Prevalence] • Network Data [E.g. Network session data; Proxy logs; DNS Logs; Firewall Logs; Switch & Router Logs] • Security Data [E.g. Threat Intelligence; SIEM Alerts; Friendly Intelligence]
  • 18. Case Study I: Potential C2 Activity • Goal: Identify potential C2 activity utilizing dynamic DNS (DDNS) that could avoid possible detection. • Datasets Required: 1. DNS query logs (outbound traffic) 2. Proxy logs (outbound traffic) 3. A list of dynamic DNS provider domain names (e.g. malwaredomains.com) • Analysis Technique Used: • Searching • Stack Counting
  • 19. • What should you look for? 1. List down the list of domains hosted on dynamic DNS (DDNS) providers (e.g. no-ip.*; ddns.*; etc.) 2. Utilize a lookup or feed of known dynamic DNS (DDNS) domains to query against data in a SIEM or log aggregator. • In DNS query Logs: 1. Trace the DNS query back to the source machine inside your network 2. Determine which host made the original DNS query • In Proxy Logs: 1. Determine the IP address that the dynamic DNS hostname resolves to 2. Determine ports/protocols communicated over 3. Determine the bytes in and bytes out 4. Determine the frequency and interval If the results are found to be suspicious in nature: SWITCH ON – INCIDENT RESPONSE MODE Case Study I: Potential C2 Activity
  • 20. Case Study II: Suspicious email notification from employee which is a MalSpam • Goal: Identify if any of the user / system in your environment has fallen prey to Malspam • Datasets Required: 1. Firewall logs (outbound traffic) 2. Proxy logs (outbound traffic) 3. Sandbox logs 4. Email Gateway and server logs 5. EDR Logs • Analysis Technique Used: • Searching • Grouping
  • 21. Case Study II: Suspicious email notification from employee which is a MalSpam • In Email Gateway and server logs 1. Check for all the recipients of this Malspam. 2. Check how many of them got it successfully delivered. • In Sandbox Logs 1. Check if the email contains malicious Domains / URLs link. 2. Check for the Hash Value of the file downloaded. 3. Check the IP Address the Domain / URL resolves to. • In Proxy Logs 1. Check if any of the user has clicked on the Domains / URLs identified. 2. Check if the payload was downloaded on user’s machine.
  • 22. Case Study II: Suspicious email notification from employee which is a MalSpam • In EDR Logs 1. Check if the payload was successfully executed user’s machine. • In Firewall Logs 1. Check if there was communication to any suspicious IP. 2. Check byte in and byte out to verify if there was any data exfiltration attempt. At any of the stage mentioned if the results confirm successful infection then immediately: SWITCH ON – INCIDENT RESPONSE MODE