2018 Threat Hunting Report - RiskSense
2018 Threat Hunting Report - RiskSense
THREAT HUNTING
REPORT
INTRODUCTION
Organizations are experiencing new In 2018, the Information Security Community on LinkedIn
and evolving cyberthreats that are conducted its second annual online research project on
threat hunting to gain further insights into the maturity and
increasing in both sophistication
evolution of the security practice.
and frequency, often overwhelming
Security Operation Center (SOC) staff. The research confirms that organizations realize that
proactively uncovering security incidents pays off with earlier
detection, faster response, and denial of future exploits.
Threat Hunting refers to the manual
and machine-assisted methods of We would like to thank our sponsor RiskSense for supporting
proactively and iteratively searching this unique research.
through networks and datasets to
We hope you will enjoy the report.
find threats.
Thank you,
Many SOCs are going through a
posture shift as they are pivoting from
Holger Schulze
traditional reactive security postures
to a hybrid approach that includes
proactive hunting of threats.
Holger Schulze
CEO and Founder
Cybersecurity Insiders
2018 THREAT HUNTING REPORT All Rights Reserved. Copyright 2018 Crowd Research Partners 2
KEY SURVEY FINDINGS
Threat hunting is gaining momentum - Organizations are increasingly utilizing threat hunting platforms (40 percent), up 5
1 percentage points from last year’s survey. Threat hunting is gaining momentum and organizations are making the investment
in resources and budgets to shift from reacting to attacks to the creation of proactive threat hunting programs and dedicated
teams. Six out of 10 organizations in our survey are planning to build out threat hunting programs over the next three years.
Threat hunting delivers strong benefits - Organizations are growing more confident in their security teams’ ability to quickly
2 uncover advanced attacks. A third of respondents are confident to very confident in their threat hunting skills, a 7 percentage
point increase over last year. Threat Hunting tools improve the speed of threat detection and response by a factor of 2.5x
compared to teams without dedicated threat hunting platforms. The top benefits organizations derive from threat hunting
include improved detection of advanced threats (64 percent), followed by reduced investigation time (63 percent), and saved
time not having to manually correlate events (59 percent).
Threat management challenges - Detection of advanced threats remains the #1 challenge for SOCs (55 percent), followed by
3 lack of security expertise (43 percent). 76 percent of respondents feel that not enough time is spent searching for emerging and
advanced threats in their SOC. Lack of budget (45 percent) remains the top barrier to SOCs who have not yet adopted a threat
hunting platform.
Most important threat hunting capabilities - The most important threat hunting capabilities for cybersecurity professionals
4 is threat intelligence (69 percent), followed by User and Entity Behavior Analytics (UEBA) (57 percent), automatic detection (56
percent), and machine learning and automated analytics (55 percent).
Threat frequency and severity increases - A majority of 52 percent say threats have at least doubled in the past year. Based on
5 this trend, the number of advanced and emerging threats will continue to outpace the capabilities and staffing of organizations
to handle those threats..
THREAT HUNTING
SEVERITY & FREQUENCY OF CYBER THREATS
Cybersecurity professionals have an ongoing challenge of constantly Over half of the SOCs (56 percent) polled have experienced
defending against increasing number of security threats, not only in an increase in the frequency of cyber attacks over the last 12
terms of volume of attacks but also their severity (damage and impact). months. Only 6 percent say the frequency has decreased.
In the past 12 months, the severity of security attacks directed at The results further illustrate the need for organizations to
organizations has increased. Nearly 52 percent of organizations have pivot from a purely reactive security stance to becoming
experienced at least a doubling of security attacks. Only 8 percent of more proactive by hunting threats and adversaries.
respondents signaled a decrease in attacks.
Which of the following best describes the change in severity Which of the following best describes the frequency of
(potential damage and impact) of security threats faced by security threats faced by your organization compared
your organization in the past year? to the previous year?
What is the estimated financial impact of a security threat that goes undetected and results in a breach at your organization?
50%
44%
Nearly half of the respondents estimate
the financial impact of an undetected data
breach to be over half a million dollars
21%
12% 8%
3% 6%
Under $500,000 $1 million to $3 million to $6 million to More than
$500,000 to $999,999 $2.9 million $5.9 million $9.9 million $10 million
The top three objectives that threat hunting programs focus on: reducing exposure to external threats (56 percent), improving speed and
accuracy of threat response (52 percent) and reducing the number of breaches (49 percent).
What are the primary goals of your organization’s threat hunting program?
56%
Reduce exposure
52%
Improve speed and accuracy
49%
Reduce number of
to external threats of threat response breaches and infections
Reduce dwell time from infection to detection 39% | Optimize resources spent on threat response 34% | Other 8%
Does your security team currently use a threat hunting If you don’t have a threat hunting program in place already, are
platform for security analysts? you planning on building a threat hunting program in the next
three years?
NO YES YES NO
Fortunately, organizations are recognizing the importance of proactively hunting threats and made it both a higher priority (barrier
lowered to 10 percent compared to 19 percent in the previous year) and addressed the lack of training (7 percent).
What is the main reason your SOC does not have a dedicated threat hunting platform for its security analysts?
45%
Lack of budget
15% 10% 7% 4%
Platform fatigue, Not a priority Lack of training Lack of collaboration
we have many platforms for our SOC on threat hunting across departments
Other 19%
What are the main benefits of using a threat hunting platform for security analysts?
64%
Improving detection
63%
Reducing
59%
Saving time from
of advanced threats investigation time manually correlating events
Connecting disparate sources of information 49% | Saving time scripting and running queries 42% | Reducing extra and unnecessary noise in the system 39% |
Reducing attack surface 35% | Other 7%
How confident are you in your SOC’s ability to uncover advanced threats?
38% 33%
of respondents
are confident to
2 4
Over the past year, industry awareness in the security category of threat hunting has increased. Seven in 10 respondents have some
knowledge or are very knowledgeable about the topic. This is an increase of 13 percentage point compared to last year’s survey.
18%
I am very knowledgeable on
threat hunting (and actively
14%
perform it for my organization)
I am unfamiliar with
threat hunting
19%
I am very knowledgeable
13%
on threat hunting
(but don’t actively perform it)
I am aware of threat hunting,
but have no knowledge
73%
36%
Have a moderate or high
I have some knowledge degree of knowledge
on threat hunting about threat hunting
From a maturity perspective, nearly 15 percent believe they are cutting-edge, up 8 percent from last year. However, 33 percent of
respondents state that their capabilities are limited, a jump of nearly 6 percentage points higher from the previous year.
Which of the following best reflects the maturity of your SOC in addressing emerging threats?
We are cutting-edge,
ahead of the curve 15%
We are advanced,
but not cutting-edge 28%
We are compliant,
but behind the curve 24%
Our capabilities are
limited at this time 33%
Approximately, what percentage of employees at your SOC are threat hunting today?
5 or fewer
51%
6-10
26%
11-50
14%
17% SOC employees
involved in threat hunting 51 or more
9%
Notably, lack of confidence in automation tools catching all threats (36 percent), jumped from fifth place in last year’s survey to third today.
Which of the following do you consider to be top challenges facing your SOC?
55%
Detection of
43%
The lack of expert
advanced threats security staff to assist
(hidden, unknown, with threat mitigation
and emerging)
Lack of confidence Too much time Slow response time Working with outdated Lack of proper
in automation tools wasted on false to find or detect SIEM tools and SOC reporting tools
catching all threats positive alerts advanced threats infrastructure
Other 7%
7% Other
2018 THREAT HUNTING REPORT 15
TIME SPENT ON THREAT HUNTING
Traditionally, SOCs approach to threats and the tools they use - such as antivirus, IDS, or security information and event management
(SIEM) - are typically reactive response technologies.
This is a reactive posture, whereas they spend a majority of their time reacting to threats, instead of proactively seeking new unknown
threats that enable early detection and quicker response. Nearly 3 in 4 (76 percent) respondents believe their SOC does not spend
enough time proactively searching for new threats, slightly improving by 5 percentage points compared to last year.
Do you feel enough time is spent searching for emerging and advanced threats at your SOC?
24%
YES
76%
NO
Over 84 percent surveyed, agree that threat hunting should be a top security initiative, an increase of 5 percentage points from the year
before.
What is your level of agreement with the following statement? “Threat hunting should be a top security initiative.”
Strongly
disagree
By employing tools and automation alongside SOC personnel, organizations can make better informed decisions, resulting in earlier
detection, faster responses, and reducing an adversary’s dwell time.
What type of IT environment does your threat hunting program primarily focus on?
49%
22%
17%
4% 8%
Multiple IT On premises/ Managed service/ Public Other
environments colocation hosted cloud
The good news, organizations are making the switch to include threat hunting as part of their security framework. They are discovering
that proactive threat hunting can reduce the risk and impact of threats while improving defenses against new attacks.
In-house
threat hunting
No proactive
threat hunting 11%
2018 THREAT HUNTING REPORT 19
THREAT HUNTING FREQUENCY
Early detection of cyber breaches and rapid response can mitigate the severity and impact of damages.
Forty-two percent of organizations continuously and actively hunt threats, followed by 36 percent who perform threat hunting only
reactively, as the need arises. Thirteen percent do not perform any threat hunting.
42% 36%
9% 13%
Continuously Ad-hoc, Scheduled at We don't
as need arises certain intervals perform
(daily, weekly, threat hunting
monthly)
On average, how many days do attackers who breached your What percentage of emerging and advanced threats are
security defenses dwell in your network before they are missed by traditional security tools?
discovered by your SOC?
39%
30
DAYS
Average time attackers
dwell on networks
MISSED
Security Threats
until discovered
Up to ...
16%
58%
1 day
3 days
26%
within
7 days 16% 7 days
14 days 9%
14%
61%
30 days
60 days 6%
100 days
8% DETECTED
Security Threats
500 days 5%
On average, how many hours does it take to detect and respond to threats WITH / WITHOUT a threat hunting platform?
92%
75%
2.5x
speed improvement of threat
Time to detect detection and response
& respond WITH a threat hunting platform
24 hours
5% 2% 1% 1%
12% 4% 3% 4% 2%
Bottom Line: there are numerous security datasets to investigate. The best practice is not to depend solely on one, but to gather,
normalize and analyze a variety of sources for a more complete, timely, and accurate picture.
What kind(s) of data does your security organization collect and analyze?
69%
Firewall &
63%
Web and email
61%Network
IPS logs filter traffic traffic
Packet sni/tcpdump 37% | System logs 36% | File monitoring data 32% | Don’t know 12% | Other 6%
In a typical week, what percentage of your threat management time is spent with alert triage or reactive response to security threats
versus engaging in proactive and innovative detection methods?
VS.
40%
Proactively
60%
Reacting to
detecting threats security threats
Our research reveals that hunt teams most frequently investigate behavioral anomalies (67 percent), followed by IP addresses (58
percent), and tied for third are both domain names and denied/flagged connections at 46 percent.
What kinds of indicators are most frequently investigated by your hunt team?
67%
Behavioral anomalies
(unauthorized access
attempts, etc.)
User and Entity Behavior Analytics (UEBA) (57 percent), automatic detection (56 percent), machine learning and automated
analytics (55 percent) and full attack lifecycle coverage (55 percent) round out the top five capabilities.
What capabilities do you consider most important regarding the effectiveness of a threat hunting tool?
Vulnerability scanning 47% | Integration and normalization of multiple data sources 45% | Intuitive data visualization 44% | Automated workflows 43% |
Fast, intuitive search 43% | Other 5%
The top three technologies that organizations utilize for threat hunting are NGFW, IPS, AV (55 percent), SIEM (50 percent) and anti-phishing
or other messaging security software (49 percent). Interestingly, threat intelligence (39 percent) ranked fourth in this year’s survey.
Which technologies do you use as part of your organization’s threat hunting approach?
55%
NGFW, IPS, AV,
web application
firewall, etc.
Network IDS 31% | Orchestration (e.g., Phantom, Hexadite, Resilient, etc.) 11% | Not sure/Other 19%
Incident response (71 percent) takes the top spot, followed by SIEM (63 percent), and tied for third place (56 percent) are ticket system
and active directory.
With what systems would you like your threat hunting platform to integrate?
71%
Incident response
63% SIEM
56%
Active directory
Other 9%
DEPARTM ENT
33% 24% 16% 8% 6% 4% 9%
IT security IT operations Security Operations Center (SOC) Sales/Marketing Operations Engineering Product Management Other
J O B LE VEL
24% 12% 11% 10% 9% 8% 26%
Security Analyst IT Manager, Director or CIO Threat Analyst Security Manager CSO, CISO or VP of Security Systems Administrator Other
CO M PAN Y SIZE
35% 13% 9% 15% 6% 22%
Less than 100 100-499 500-999 1,000-4,999 5,000 - 9,999 10,000 or more
I N DUSTRY
20% 17% 14% 6% 6% 5% 9% 23%
Government Technology Financial Services, banking or insurance Manufacturing Telecommunications or ISP Healthcare Retail or ecommerce
Other
RiskSense | www.risksense.com
RiskSense ®, Inc. is the pioneer in intelligent threat and vulnerability management. The company provides
enterprises and governments clear visibility into their entire attack surface, including attack susceptibility
and validation, as well as quantification of risks based on operational data.
The RiskSense Software-as-a-Service (SaaS) platform unifies and contextualizes external threat data,
internal security intelligence, and business criticality to transform cyber risk management into a proactive,
collaborative, and real-time discipline. It embodies hands-on expertise gained from defending critical
government and commercial networks from the world’s most dangerous cyber adversaries.