Cyber threat hunting after the holidays

Sentinel Labs Australia Pty Ltd

By Niranjan Jayanand, WatchTower Threat Hunting Manager APAC
Tuesday, 17 January, 2023


Cyber threat hunting after the holidays

With the holidays behind us, employees are returning to work after some well-deserved time off with their family and friends. In cybersecurity departments, this is a time of extreme caution. After nearly a month of skeleton crews and shorter hours, now is the time to look for any malicious code that may have slipped beyond the security perimeter and into the company’s network.

Infiltrations over the holiday season can easily go unnoticed, and the malicious code sitting within the company system may not be exploited for several months. By the time the threat actor is ready to launch their attack, they have everything they need in place to steal data, transfer money to their own accounts or wreak havoc.

Post-holiday threat-hunting activities can help Australian businesses find these pieces of malware and safely remove them from the network. Threat-hunting activities were recently legislated in Singapore, and we believe it is advisable for all Australian businesses to conduct them.

What is threat hunting?

Threat hunting is a proactive effort to search for signs of malicious activities that have evaded security defences within an organisation. Threat hunters are able to uncover hidden threats that may be waiting to execute an attack or find events that have already compromised the environment.

Effective threat hunting helps uncover hidden advanced persistent threats (APTs), cybercrime, policy misuse, insider threats, poor security practices and environmental vulnerabilities. The activity aims to identify attacks that slipped past your defensive shield.

Conducting a threat hunt

Threat hunting begins by reviewing and correlating logs from different areas of the network. These include firewall logs, DNS logs, web proxy logs and NIDS/NIPS logs, as well as endpoint data that covers all network connections, file events and registry events.

Threat hunters compare and contrast the data within the logs as they search for unexpected access and anomalous activity. These logs create a rich hunting ground to proactively identify hidden threats, risks and vulnerabilities, and they empower your team to proactively mitigate risks that degrade your security posture.

These activities can be conducted manually. However, using automated tools and AI reduces the time required to review the logs and helps ensure that nothing is overlooked.

Benefits of threat hunting

Threat hunting allows security teams to proactively get ahead of the latest threats by hunting for malicious activity. It helps to improve a company’s true risk posture and prevent any number of cyber incidents from progressing into full-blown attacks. When threat-hunting activities are complete, they provide confidence and peace of mind to security teams who no longer need to worry about latent threats hiding within the network.

Image credit: iStock.com/Federico Caputo

Related Articles

How surveillance cameras facilitate a smarter and safer world

As Australia's population continues to grow, surveillance technologies will be crucial to...

Adapting to new cybersecurity challenges: a roadmap for Australian government agencies

Given the rise in cyber threats against government networks and critical infrastructure sectors,...

Growing fraud trends in Australian health care

As the healthcare landscape evolves, so do the methods of fraud.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd