Overview
Direct Answer
Threat hunting is the proactive and iterative process of searching for adversaries and malicious activity that existing detection systems have failed to identify within an organisation's infrastructure. Unlike reactive incident response, it assumes breach and systematically investigates suspicious behaviour patterns using hypothesis-driven methodologies.
How It Works
Analysts develop threat hypotheses based on threat intelligence, attack frameworks, and known adversary tactics, then search through network logs, endpoint telemetry, and system artefacts to validate or refute those hypotheses. This cycle involves querying data sources, correlating events, and escalating findings to incident response teams. The process emphasises manual investigation combined with analytics tools to uncover subtle indicators of compromise.
Why It Matters
Organisations face a detection gap where sophisticated adversaries dwell undetected for extended periods; hunting closes this gap by reducing dwell time and minimising breach impact. Regulatory compliance frameworks increasingly expect active threat-seeking capabilities, and early detection significantly reduces remediation costs and data exposure risk.
Common Applications
Financial institutions hunt for unauthorised account access and lateral movement; healthcare organisations search for data exfiltration patterns; technology firms investigate supply chain infiltration. Threat hunting supports response to advanced persistent threats and zero-day exploitation where signature-based detection proves insufficient.
Key Considerations
Threat hunting demands significant skilled personnel and investment in data retention infrastructure, making it resource-intensive for smaller organisations. Success depends heavily on the quality of threat intelligence and hypotheses; poorly targeted searches yield false positives that erode team productivity.
Cross-References(1)
More in Cybersecurity
Threat Intelligence
Offensive SecurityEvidence-based knowledge about existing or emerging threats to an organisation's digital assets and infrastructure.
Information Security
Security GovernanceThe practice of protecting information by mitigating information risks including unauthorised access, use, and disruption.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
Encryption
Data ProtectionThe process of converting plaintext data into ciphertext using an algorithm, making it unreadable without the decryption key.
Cyber Kill Chain
Offensive SecurityA model describing the stages of a cyberattack from reconnaissance through data exfiltration.
Spear Phishing
Offensive SecurityA targeted phishing attack directed at specific individuals or organisations using personalised deceptive content.
MITRE ATT&CK
Offensive SecurityA globally accessible knowledge base of adversary tactics and techniques based on real-world cyber observations.
Attack Vector
Offensive SecurityThe specific path, method, or scenario used by an attacker to gain unauthorised access to a system.