BreachExchange mailing list archives
Stop waiting and start hunting
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 19 Feb 2016 14:37:11 -0700
http://www.scmagazineuk.com/stop-waiting-and-start-hunting/article/471948/ As the old adage goes, “You have to think like a criminal to catch one.” While cyber-security attacks are devastating enough on their own, what's more worrying is that over two-thirds of businesses are notified of these attacks by a third party as opposed to discovering it themselves. Prevention is not enough Relying on prevention is not a sound strategy for IT security in the 21st century. What if there was someone working inside the organisation that thought like a criminal but was actually fighting for the good guys? They could not only prevent the damage from an attack but could greatly improve detection and response times. This person is what is known to some organisations in the IT security industry as a “threat hunter”. What is a threat hunter? The primary role of a threat hunter consists of looking for indicators of compromise or the evidence of a breach. A threat hunter does this by operating under the “attacker mentality” to find out what they would see or what trails they would follow. In other words, it's all about businesses staying one step ahead of the game to protect themselves from the all too familiar and devastating consequences of a security breach. There are many different ways threat hunters are being described in the industry. A threat hunter sits within an active defence framework, however many organisations don't approach their role from a framework perspective. Threat hunting requires an organisation to allocate dedicated resources towards this particular part of active defence. Chances are if you work in IT security, you've probably heard the term before. With the potential of threat hunting to snare a cyber-attacker, why isn't it something that's more widespread in the mainstream media? And, why has the need for threat hunters arisen, and why is it growing? Many security teams operate under the assumed breach mentality and attempt to balance prevention and detection strategies. Businesses are beginning to prioritise cyber-security after so many high profile attacks. A security confidence survey by SolarWinds found that 84 percent of respondents reported their organisations have experienced a significant attack, with 35 percent reporting that it took at least one month to discover the attack. This further highlights the need for businesses to have the right security practices in place. One part of a well-rounded security programme is to implement a threat hunting capability. What it takes Organisations, who are employing threat hunters to join their IT security teams, are looking for people who have a breadth of experiences. With security, the more a person knows about the network, and applications and servers, the better. Often there are multiple components involved in an attack and they're not just restricted to the network. So, for example, if a person has good network knowledge but doesn't understand the applications then it could be difficult for them to identify that an attack has occurred or is under way. Benefits of threat hunters The primary benefit of a threat hunter is pretty easy to see: if an organisation can identify attacks while they are underway, they can prevent any real damage from occurring and prevent future attacks. Some of the most common gaps in a company's infrastructure that can cause the most damage are: · Lack of good segmentation in the network · Overly permissive access permissions from trusted machines or accounts · The use of insecure protocols · Lack of monitoring to provide automated detection and visibility Generally speaking, the goal of the threat hunter is to quickly find evidence of attacks to prevent damage to an organisation. So while an attacker may have already breached the defences (passed the preventative measures), they may not have actually stolen data, taken down systems, or otherwise impacted the business. After they detect an attack, they can help to mitigate the damage and the organisation can leverage their findings to improve its preventative defences. While a penetration tester looks for weaknesses in a company's systems, a threat hunter looks for evidence of someone actively attacking those systems. Both are equally important but serve very distinct purposes. Most organisations will more than likely have regular penetration tests scheduled before they add a full-time threat hunter to their team, but just because a penetration tester discovers a hole in the defences, doesn't mean anyone else has. A threat hunter can help answer that question, and is more focused on what attacks have actually happened versus what could happen. Allowing one dedicated individual to focus and pick up vulnerabilities so IT security can be more effective at discovering an attack or breach before they happen can be vital. Challenges of threat hunters With the benefits of threat hunters there are also some challenges. One of the main challenges is hiring. Simply put, you need someone who has a vast skillset and who is a self-starter. Furthermore, employing a threat hunter isn't a realistic option for small or medium-sized businesses; they just don't have the resources to devote one person to the role as other basic IT functions would suffer. However, larger organisations may find it valuable to have a threat hunter as part of their team. Ultimately, it's down to businesses to see threat hunting as a valuable skillset to have – because without it, attackers can move around your infrastructure and nobody will know until it's too late. And we all know how that story can end.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Need access to data breach details or alerts when new breaches happen? Risk Based Security's Cyber Risk Analytics portal, fueled by the RBS breach research team, provides detailed information on how data breaches occur and which vendors to trust. Contact us today for a demo.
Current thread:
- Stop waiting and start hunting Audrey McNeil (Feb 22)