Bring Your Own Hunts to HUNTER471
As a HUNTER471 customer utilizing the Hunt Management Module (HMM), you can now “bring your own” (BYO) threat hunting content to the HUNTER471 threat hunting platform.
Threat Hunting Case Study: Uncovering Turla
Adversaries try to hide malicious components by renaming them as legitimate Windows binaries. This technique has been used by the Turla threat actor group and others. Here's how to threat hunt for this behavior.
Threat Hunting Case Study: Tracking Down GootLoader
GootLoader is malware used to gain initial access to computers for exploitation by threats such as ransomware. In this case study, we describe how to use the HUNTER platform to threat hunt GootLoader infections.