NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
September 17, 2020

Threat Hunting Basics: The Hunted Becomes the Hunter

Justin Fimlaid Justin Fimlaid

What Is Threat Hunting?

Threat hunting is the process of proactively searching through environments and networks to detect and isolate advanced threats undiscovered by traditional security solutions. Threat hunting assumes that the environment is already compromised and attempts to locate active threats before they can do significant damage. Threat hunting is not a replacement for SIEM, SOC, or other traditional security solutions, but is intended to complement existing solutions to catch any threats that manage to slip through the cracks.

Threat hunting is a proactive process, not a reactive one. This means that threat hunters actively seek out threats that could already exist in the environment instead of waiting for alerts from a SOC team that there is an active threat in the network. When configured and run properly, traditional security solutions can detect and prevent most threats, but for advanced threats that can evade these systems, an active threat hunting approach is needed.

Why Is Threat Hunting Important?

No security solution can be 100% accurate, and the threat landscape is always changing. Breaches can be hard to detect. According to a recent study by IBM, companies take an average of 197 days to detect a breach. Threats that make it through traditional security solutions undetected can sit on a network for months and sometimes years, exfiltrating data and spreading throughout the network. Using threat hunting to shorten the time to discovery of advanced threats can significantly decrease the overall damage and scope of a breach and may even stop a campaign before any damage is done.

Getting Started With Threat Hunting

There are four main things you want to have when you start planning out your threat hunting program. You need actionable threat intelligence, aggregated security data, a solution to process and analyze that data, and qualified threat hunters to use the intelligence and analyzed data to find threats.

Actionable Threat Intelligence

Actionable threat intelligence helps analysts know what to look for when they are conducting the hunt. This intelligence helps to provide information about where to look and what to look for before analysts can actually start hunting. Without this intelligence, you're basically trying to find Waldo in a Where’s Waldo picture without a description of Waldo! Threat intelligence should be relevant to your organization structure and industry. By targeting threats that your organization is likely to face, you spend less time looking for threats that are unlikely to impact you.

There is a wide range of sources that threat intelligence can come from, and what will be useful depends on your specific needs and industry. Free and paid threat feeds are a great place to start, as well as collecting indicators of attacks and Indicators of Compromise which you can use to determine who is attacking your system and how to find them. Actionable threat intelligence is covered in depth in our Threat Intelligence Basics article.

Aggregated Security Data

Having a good data set for analysts to look through is critical for finding threats to be located. This security data should be a cross-section of the environment to avoid bias and increase the diversity of information and sources. Data sources can include firewall and IDS logs, network traffic, endpoint security solutions, Active Directory/LDAP logs, DNS, VPN and switch logs, and much more. The more diverse and representative of the organization the data is the better, as long as it's relevant and organized.

A Solution to Process and Analyze Data

A wide range of solutions can be used to process and analyze collected data, and what your organization ends up using will be dependent on your needs and resources. Solutions can range from a full-fledged SIEM or dedicated threat solution such as ThreatConnect, to an excel workbook. Analytical tools can also be used to help visualize and statistically process data giving the analyst a better understanding of what the data is showing.

Whatever process you use, it should keep your data organized and analyzed efficiently and bring value to the analysts. This will allow threat hunters to look through large amounts of data, filter out what is not relevant, and provide timely and meaningful results.

Qualified Threat Hunters

This is the most important part of threat hunting! The human element is critical to finding threats that slip through automated searches and defenses. Humans have a knack for picking out patterns that computers cannot. Threat hunters must have technical knowledge across a wide range of cybersecurity topics and be able to effectively use tools and analyze data to find the signal in the noise. Tools are only useful if the user knows what they're doing!

The MITRE ATT&CK framework is a great way to get started when structuring your threat hunting process. You can also work with a trusted partner like NuHarbor to provide this service or help you get your process off the ground.

Conclusion

Threat hunting is a critical part of any cybersecurity program and can add significant value by augmenting your existing traditional security program. Proactively searching for threats in your environment can reduce the scope of a breach and catch threat actors before they can do significant damage.

Not sure if you have the personal or resources to start your threat hunting program, or want expert advice? Contact NuHarbor to learn about our Cyber Threat Analyst Center (CTAC). Our experienced threat analysts will monitor your environment to identify low operating threat actors that don't trip traditional alerts. 

Included Topics

  • Threat Intelligence
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Managed Services 9 min read
What is Managed Extended Detection and Response (MXDR)?
Read More
6 min read
What is Continuous Security Monitoring?
Read More
Threat Intelligence 2 min read
Cyber Threat Intelligence 101: The Basics Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.