Threat hunting is the proactive practice of searching through networks, endpoints, and data to detect threats that have bypassed existing security defenses.
Key Characteristics:
Proactive:
Instead of waiting for security tools to trigger alarms, threat hunters actively search for hidden threats.
Hypothesis-Driven:
Threat hunters usually start with an idea or hypothesis about what kind of threat might exist, based on threat intelligence, known attacker behaviors (TTPs), or observed anomalies.
Iterative and Analytical:
Threat hunting is not a one-time event. It involves cycles of asking questions, exploring data, testing hypotheses, and refining the search based on findings.
Summary:
Threat hunting helps organizations find sophisticated attacks early, even before damage is done.
Different methods can be used for effective threat hunting:
Uses external or internal threat intelligence to guide the search.
Focus:
Example:
Hunting for connections to an IP address flagged in a threat intelligence report.
Focuses on detecting attacker behaviors rather than specific indicators.
TTP stands for:
Tactics: The attacker's goals
Techniques: How they achieve those goals
Procedures: The specific ways they carry out techniques
By hunting for behaviors, organizations can detect attacks even if specific IOCs change.
Example:
Hunting for signs of credential dumping, regardless of which tool the attacker used.
Focuses on identifying deviations from normal behavior.
Steps:
Define what is "normal" for users, systems, and network traffic.
Search for activities that break those patterns.
Example:
A user who typically logs in during business hours suddenly logs in at 3 AM from a foreign country.
Triggered by specific external or internal events.
Examples of triggers:
A newly discovered software vulnerability
Major news about an industry-wide cyberattack
Internal detection of suspicious activity
In such cases, organizations conduct focused hunts related to the specific threat.
Summary:
Using multiple methodologies allows hunters to catch both known and unknown threats.
The threat hunting process typically follows these steps:
A hypothesis or lead that starts the hunt.
Sources of triggers:
Threat intelligence
Anomalous behavior observed
Known vulnerabilities
Suspicious system alerts
Example:
News about a new ransomware strain leads a team to hunt for signs of related infections.
Deep exploration of the environment to search for signs of malicious activity.
Methods:
Running SPL queries
Pivoting from one suspicious event to related activities
Analyzing linked data across systems
Example:
Investigating multiple failed login attempts followed by a successful one.
Discovering new attack patterns or malicious artifacts.
Patterns and artifacts include:
New types of malware files
Specific IP addresses or domains used by attackers
New techniques attackers are using
Once discovered, they can be used to update detection capabilities.
If a real threat is found:
Immediate action must be taken to contain and eliminate the threat.
Serious incidents may be escalated to the incident response team for further handling.
Document findings to:
Improve detection rules
Educate security teams
Strengthen the organization's defenses
Example:
Adding newly discovered malware hashes to threat intelligence feeds.
Credential abuse may occur through repeated login failures across multiple servers.
In Splunk, a search to test this hypothesis:
index=security sourcetype=wineventlog:security (EventCode=4625 OR EventCode=4624)
| stats count by user, src_ip
| where count > 50
This search finds users and source IPs with unusually high numbers of authentication events.
Splunk provides powerful tools to assist threat hunters:
Data models organize and accelerate large datasets.
Using accelerated data models allows:
Faster searches across huge volumes of security event data.
Consistent field names and data structure for easier analysis.
Example:
Using the Authentication data model to quickly find login anomalies.
Instead of treating every alert separately, risk-based alerting:
Combines the risk from multiple small events
Focuses attention on entities (users, devices) with the highest total risk
Benefits:
Reduces alert fatigue
Prioritizes the most dangerous threats
Splunk ES is an advanced security platform that provides:
Threat Activity dashboards
Risk Analysis dashboards
Incident Review dashboards
These dashboards help hunters quickly spot suspicious behaviors and coordinate responses.
Lookups allow searches to be enriched with external or internal data, such as:
Lists of known bad IP addresses
Known malware file hashes
Suspicious domains
Using lookups speeds up and improves the accuracy of threat hunting.
SPL macros are reusable chunks of SPL code.
Benefits of using macros:
Build flexible searches
Save time when creating complex queries
Maintain consistency across different hunts
Example:
Creating a macro to search for suspicious user behavior across multiple systems.
When a threat is found, remediation is the process of eliminating the threat and restoring the environment to a safe state.
Steps involved:
Confirm that the threat is real and understand its full scope.
Activities:
Determine which systems are affected
Understand how the threat entered
Stop the threat from spreading.
Common actions:
Disconnect infected machines from the network
Disable compromised user accounts
Block malicious IP addresses
Remove the threat completely.
Actions include:
Deleting malware
Closing vulnerabilities
Changing stolen passwords
Restore normal operations securely.
Steps:
Rebuild or restore clean systems
Verify systems are free of infections
Monitor closely for signs of re-infection
Analyze what happened and why.
Objectives:
Understand the root cause
Identify weaknesses
Update defenses and response plans
Modern organizations use SOAR (Security Orchestration, Automation, and Response) tools like Splunk SOAR to automate parts of remediation.
Common automated actions:
Blocking malicious IP addresses in firewalls
Disabling compromised accounts immediately
Triggering endpoint antivirus scans
An alert is triggered.
The system automatically enriches the alert with threat intelligence.
If the IP address is confirmed malicious:
Quarantine the infected device.
Notify the Security Operations Center (SOC).
Automation saves time and reduces the risk of human error during a security incident.
The Hunting Maturity Model (HMM) is a framework that describes an organization’s capabilities and progression in conducting threat hunting activities.
Key Characteristics:
Provides a structured way to assess and improve threat hunting capabilities over time.
Helps organizations understand where they currently stand and what steps are needed to become more proactive and advanced.
The HMM defines several levels of maturity:
Initial:
Hunting is reactive, and detection relies solely on alerts from security tools. No formalized hunting processes exist.
Minimal:
Some manual, ad-hoc hunting efforts are performed, usually without defined processes or automation.
Procedural:
Hunting follows documented, repeatable procedures, often based on known threats or attack patterns.
Innovative:
Hunters proactively develop new detection methods and leverage advanced analytics and threat intelligence.
Leading:
Threat hunting is fully integrated into the security operations lifecycle. There is continuous innovation, use of machine learning, and close alignment with business risk priorities.
Purpose:
To encourage a shift from reactive to proactive threat detection.
To guide investment in tools, skills, and processes that improve hunting effectiveness.
Summary:
The Hunting Maturity Model (HMM) helps organizations evaluate and enhance their threat hunting capabilities by progressing through defined maturity levels, from initial reactive detection to proactive and innovative security practices.
In the context of remediation, especially after a cybersecurity incident, it is crucial to prioritize the protection of an organization's crown jewels — its most critical assets.
Key Characteristics:
Crown jewels refer to the systems, data, and services that are vital to the organization’s core operations and strategic objectives.
These assets typically include:
Financial systems.
Customer databases containing sensitive information.
Intellectual property repositories.
Mission-critical applications.
Why Prioritize Crown Jewels:
Attacks on crown jewels can cause the most severe financial, reputational, and operational damage.
Resources during incident response are often limited, requiring careful triage.
Protecting critical assets first ensures the organization can continue essential business functions even if broader remediation efforts are still ongoing.
Approach:
Identify crown jewels as part of the organization’s pre-incident planning.
In the event of a breach, prioritize containment, eradication, and recovery efforts around these key assets.
Deploy enhanced monitoring and additional security controls around crown jewels during and after the incident.
Example:
Summary:
Effective remediation strategies prioritize safeguarding crown jewels — the assets that are essential to an organization's survival and success — ensuring that the most critical resources are protected first during a security incident.
What is hypothesis-driven threat hunting?
It is a proactive investigation approach where analysts test a suspected attack scenario using available data.
Rather than waiting for alerts, analysts begin with a hypothesis about possible malicious behavior. For example, they may suspect that attackers are using stolen credentials for lateral movement. The analyst then constructs searches across authentication logs, network events, and endpoint data to confirm or refute the hypothesis. This process often reveals subtle indicators of compromise that automated detection rules might miss.
Demand Score: 80
Exam Relevance Score: 81
What is long tail analysis in threat hunting?
Long tail analysis focuses on rare or unusual events that occur infrequently in large datasets.
Most system activity follows predictable patterns. Rare events appearing in the “long tail” of data distributions may indicate anomalies or suspicious behavior. Analysts use statistical analysis or behavioral baselines to identify events that deviate from normal patterns. In Splunk, this may involve identifying uncommon processes, unusual network destinations, or rare authentication patterns.
Demand Score: 76
Exam Relevance Score: 79
When should adaptive response actions be triggered in Splunk Enterprise Security?
When automated actions are needed to respond immediately to confirmed or high-risk threats.
Adaptive response actions allow Splunk to initiate predefined security operations automatically after a detection occurs. Examples include blocking an IP address, isolating a host, or creating a ticket in an incident management system. These actions reduce response time and help contain threats quickly. Analysts configure adaptive responses within correlation searches so they activate when specific conditions are met.
Demand Score: 75
Exam Relevance Score: 80
How do SOAR playbooks integrate with Splunk Enterprise Security?
SOAR playbooks can be triggered automatically from notable events generated by correlation searches.
When Splunk Enterprise Security detects suspicious activity and creates a notable event, the system can trigger automation workflows in a SOAR platform. These playbooks perform tasks such as gathering additional evidence, enriching alerts with threat intelligence, or executing containment actions. Integration between SIEM detection and SOAR automation reduces manual workload and accelerates incident response processes.
Demand Score: 73
Exam Relevance Score: 78