Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Attack-Specific Threat Hunting Is Critical for Incident Response
Cybersecurity

Why Attack-Specific Threat Hunting Is Critical for Incident Response

Chris HughesBy Chris HughesNovember 15, 2022Updated:November 28, 20223 Mins Read
Facebook Twitter LinkedIn Email
threat hunting incident response
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

You’ve had a data breach or security incident, and that’s bad news. However, on the bright side, now you have concrete insights into the malicious actors’ tactics, techniques, and procedures (TTPs). Your new insights enable you to look across your enterprise environment for other traces of the malicious actors’ activities since they might use the same or similar TTPs. In other words, you’re ready to go threat hunting.

Threat hunting is a proactive exercise to look for cyber threats that are going on undetected in an organization. It is often a hypothesis-driven activity, informed by threat intelligence and information sharing from industry organizations and peers. In our scenario, threat hunting isn’t entirely proactive, since, in it, we’ve already experienced a security incident. In our scenario, threat hunting is not driven by intelligence or information, but by TTPs and Indicators of Compromise (IOCs), which are evidence that the network’s or environment’s security has been compromised; therefore, it’s known as attack-specific threat hunting.

Immediate Response

In the case of attack-specific threat-hunting, organizations should rally their security and technology teams and ensure they understand the attack-specific threat hunting for a specific actor or threat that is underway, as well as the TTPs and IoCs. Note that by utilizing the TTPs and IoCs, your organization can now look at the enterprise and data sources such as logging and user and entity behavior analytics (UEBA) to look for additional traces of the malicious actor activity.

Uncovering Malicious Actor Activity

Malicious actors often tend to persist in an environment, moving laterally across systems and environments. This is after the malicious actor has conducted other steps in the cyber-attack lifecycle such as initial recon, compromise, and establishing a foothold. Armed with the initial reconnaissance and foothold, the malicious actors tend to escalate their privileges and explore other systems to pivot to and ultimately exploit as part of their attack campaign.

Organizations can optimize their tooling and platforms to identify things such as specific traffic flows, file signatures, and other behaviors that indicate further activity by the malicious actor that was observed during the initial incident and breach. This can help them discover other areas of the enterprise where the malicious actor has moved laterally, exploited additional systems, and gained further footholds. It can also help identify additional data that may be at risk, as that is typically what malicious actors are after, either for exfiltration, ransom, or tampering.

It is very possible and even likely that further malicious activity will be discovered. When this occurs, the incident command and associated teams should be alerted so that they can ensure the systems are properly triaged and ultimately remediated. This iterative exercise of attack-specific threat hunting and associated incident response activities will help the organization identify further malicious activity and stomp it out across the enterprise to ensure the threat is fully eliminated, at least to the best of its ability, and that the risk to the organization is addressed.

Final Thoughts

After this attack-specific threat hunting is completed, the organization should also have a much more comprehensive picture of the malicious activity as well as its impact on the organization in totality. This allows the security team and its leadership to properly brief executive leadership on what the organization experienced and how to move forward. This informs activities such as communications, legal, and more, which we are covering in additional articles as part of our series on what to do if you’ve been breached.

CLICK HERE TO JOIN THE CONVERSATION ON LINKEDIN

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity data executive featured security security teams
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers

July 3, 2025

AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter

July 3, 2025

Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live

July 2, 2025

Slack API Terms Update Restricts Data Exports and LLM Usage

July 2, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agents, Data Quality, and the Next Era of Software | Tinder on Customers
  • AI Agent & Copilot Podcast: AIS’ Brent Wodicka on Operationalizing AI, the Metrics That Matter
  • Ajay Patel Talks AI Strategy and Enterprise Adoption Trends | Cloud Wars Live
  • Slack API Terms Update Restricts Data Exports and LLM Usage
  • Google Cloud Still World’s Hottest Cloud and AI Vendor; Oracle #2, SAP #3

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.