Picture yourself as a cyber detective, ready to uncover the hidden threats lurking in the shadows of your organization's network. Sounds exciting, right? Well, hypothesis-driven hunting is all about channeling your inner Hercule Poirot to stay one step ahead of adversaries working against you.
The PEAK threat hunting framework identifies three primary types of hunts:
In this post, we’re going to look at hypothesis-driven hunting in detail. This method serves as a starting point for many hunters, as it encourages critical thinking and proactive investigation.
(This article is part of our PEAK Threat Hunting Framework series. Explore the framework to unlock happy hunting!)
As we wrote in our introduction to the PEAK framework, hypothesis-driven hunting is...
“The classic approach, where hunters form a supposition about potential threats and their activities that may be present on the organization’s network, then use data and analysis to confirm or deny their suspicions.”
If you remember your grade-school science class, you might recall that hypotheses are a key component of the scientific method, and that’s not by accident!
A hunting hypothesis is the foundation upon which your cyber detective journey is built. Think of it as the central hunch or educated guess that guides your investigation based on your intuition, experience, and research. Crafting a solid hunting hypothesis requires a delicate blend of creativity and analytical thinking.
There are three steps to creating a good hypothesis:
Hypothesis generation can be tricky, especially at first. If you get stuck, this paper on crafting hypotheses or this one on identifying priority targets can give you some ideas on where to start.
One more important note: just like in science, a hypothesis isn't set in stone – be prepared to adapt and refine it again as new insights emerge during your investigation. More on this below!
Even though you now have a clear and testable hypothesis, you still need to know a few things before you can start hunting, such as possible indicators of the activity, data source(s) you need to examine, and in which parts of the network you might expect to observe it.
PEAK incorporates the ABLE framework to help you capture the critical pieces of your hunting hypothesis:
An example might help make this more clear. Let’s revisit our example hypothesis: "A threat actor may be exfiltrating sensitive financial data using DNS tunneling." We can break this down using the ABLE framework:
With the ABLE framework applied to our hunting hypothesis, we’re beginning to see the outline of an actionable hunt plan:
With our trusty hypothesis in hand and having applied the ABLE framework, we’re ready to proceed through the three phases of the hunt: Prepare, Execute, and Act.
Each phase plays a crucial role in unraveling the mysteries hidden in the depths of your network, guiding you from the initial planning stages to the final act of sharing your hard-earned findings. Let’s take a look at each phase in detail.
The “Prepare” phase is where you do all the things necessary to maximize your chances of a successful hunt. If you’ve read through the article this far, you’ve already started preparing!
Select Topic: The first step is to choose a juicy topic that piques your interest. It’s not a full hypothesis yet but will be used to develop one. For example, our sample topic was “data exfiltration.”
Research Topic: With your topic in hand, it's time to hit the books (or the internet, rather). Gather all the information you can to become a subject-matter expert. Knowledge is power (or if you prefer, “knowing is half the battle!”). Continuing with the DNS example above, you might:
Generate Hypothesis: Based on your research, craft a hypothesis about the potential threats and their activities in your organization's network. Make sure it’s something testable, such that it’s actually possible for you to either confirm or refute while hunting. Our sample hypothesis is “A threat actor may be exfiltrating sensitive financial data using DNS tunneling.”
Scope Hunt: Define the boundaries of your investigation by identifying the systems, data, and timeframes to examine. You may also want to consider setting a maximum hunt duration (e.g., “I’ll hunt this for three days and if I don’t find anything malicious, it’s probably not happening”). The ABLE “Location” and “Evidence” are key pieces of the hunt’s scope.
Plan: Using what you learned from your research as well as the ABLE data, outline the tools, techniques, and resources you'll need to validate your hypothesis.
Making a good plan helps to ensure the execution (the next phase) goes smoothly, so it’s worth spending a little time here.
The “Execute” phase is where you implement your hunt plan. Although some would consider this where the “real hunting” happens, it’s important to understand that a hunt cannot be successful and impactful without all three phases. It’s all real!
Gather Data: With your plan in place, it's time to collect the evidence and bring it all back into one place for analysis. In some cases, this may have already happened (for example, if you’re already ingesting the DNS logs you need into a Splunk index). In other cases, you might have to identify the specific server(s) and locations on disk from which to collect the data.
Pre-Process Data: Sadly, the data we need isn’t always quite ready for analysis, especially if we had to collect it ourselves. We might need to:
Making sure that our data is clean and consistent will make the analysis much easier!
Analyze: Now it’s time to dive into the data to look for patterns, anomalies, or evidence that supports or refutes your hypothesis. This is where your intuition and analytical skills truly shine. There are many options when it comes to analytic techniques, including:
We’ll have more to say about specific analytic techniques in future blogs, but for now, just know that most threat hunters pick up new analytic techniques the way mechanics accumulate wrenches. The more hunting you do, the bigger your toolbox will grow and the better you’ll be at picking the right technique for the job.
Refine Hypothesis: When your analysis reveals new insights or fails to find what you were looking for, don't hesitate to revise. This is a normal and expected part of threat hunting. We don’t always hit the mark the first time, so one or more rounds of hypothesis refinement will often be necessary.
Escalate Critical Findings: Should you be lucky enough to find likely or confirmed malicious activity during your hunt, escalate it immediately to the incident response team for swift action. After all, time is of the essence in the world of cybersecurity.
All the detailed planning and expert execution won’t matter a whit if you can’t capture and act on the knowledge gained from your hunt. That’s what the “Act” phase is all about!
Preserve Hunt: Don't let your hard work go to waste. Archive your hunt, including the data, tools, and techniques used, for future reference or to share with other cyber sleuths. Many hunt teams use wiki pages to write up each hunt, including links to the data, descriptions of the analysis process, and summaries of key findings or metrics.
It is quite common for hunters to refer to past hunts when confronted with similar hunts later on, so do future-you a favor and take some time to save your work for posterity.
Document Findings: Write up a detailed report on your findings, including whether you validated or disproved your hypothesis, data or detection gaps you found, misconfigurations you identified, and of course, any potential incidents you escalated. This is the “so what?” of your entire hunt. These findings, and the actions your security team takes to address them, are one of the key drivers for continuous improvement of your organization’s security posture.
Create Detections: Convert your findings into production detection rules or signatures to help catch similar threats in the future. Or, send your detailed findings to the detection engineers if that’s how your organization rolls. Either way, using hunts to improve automated detection is the other key driver behind continuous improvement of your security posture.
Re-Add Topic to Backlog: As hunters, we’ll often uncover new avenues for exploration while we’re already in the midst of a hunt. Stay focused, but take note of those potential new ideas because they can become new topics or hypotheses for future hunting! If your team keeps a slush pile or backlog of potential hunts (and they should!), add them so you can revisit them later.
Communicate Findings: To keep up the detective metaphor, this would be the equivalent of Hercule Poirot gathering everyone in the drawing room for the big reveal. Share your discoveries with relevant stakeholders to improve overall security posture. Maybe the findings for each hunt are emailed to the SOC leadership and the owners of the systems/data involved. Perhaps you hold a hunt briefing for the security team once a month. Find the communication format that works best for your team as well as your stakeholders. After all, knowledge is most powerful when shared.
Hypothesis-driven threat hunting is an effective and engaging approach that combines human intuition, creativity, and analytical skills to bolster your organization's network security.
By generating a solid hunting hypothesis and applying ABLE to break it down into an actionable hunting plan, you establish a strong foundation for a successful hunt. The PEAK framework's Prepare, Execute, and Act phases guide you through the process, ensuring a well-structured, focused, and effective hunt. Embrace the power of hypothesis-driven hunting and embark on a journey to protect your organization's digital assets more effectively.
Happy hunting!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.