Threat hunting is the proactive process of searching for threats that evade existing security tools. It involves analysing data, developing hypotheses, and investigating patterns to identify suspicious activity before it causes harm.
Table of Contents
Threat hunting is a proactive cybersecurity practice focused on identifying threats that evade automated detection tools. Instead of waiting for alerts, threat hunting involves actively searching for suspicious behaviours, weak signals, or anomalies that may indicate an attacker is already present in the environment.
Threat hunting assumes that breaches can and do occur, even in well-defended environments. Hunters analyse telemetry across endpoints, networks, identities, and cloud services to uncover malicious activity that blends into normal operations. This often includes detecting credential abuse, living-off-the-land techniques, lateral movement, and persistence mechanisms that do not trigger traditional alerts.
Unlike automated detection, threat hunting relies on human-led reasoning supported by data, analytics, and threat intelligence. Over time, effective threat hunting reduces attacker dwell time, improves detection logic, and strengthens overall security posture by feeding insights back into SOC operations and detection engineering.
Attackers are getting better at avoiding detection. They use techniques like fileless malware, remote access tools, and credential abuse to blend in with legitimate activity. These methods often bypass traditional security systems.
Relying on alerts alone can leave gaps. Threat hunting addresses this by identifying threats early, often before clear indicators emerge. Unlike reactive methods that rely on alerts, threat hunting focuses on stealthy, persistent techniques that may not trigger automated defences.
As a result, threat hunting reduces dwell time, limits impact, and helps organisations respond faster. This benefit is reflecting in the fact that the number of organisations that employ formal threat hunting methodologies grew to 64% in 2024, according to the SANs threat hunting survey.
Threat hunting and incident response serve different purposes:
Threat hunting is proactive. It involves actively looking for signs of potential compromise based on assumptions or weak signals.
Incident response is reactive. It begins after a breach is detected and focuses on containment, investigation, and recovery.
The two can work together, but they follow different timelines. Hunting, for instance, may uncover incidents before they trigger alerts, allowing earlier intervention. When an issue that threat hunting missed arises, incident response frameworks step in after the breach.
Threat intelligence provides context to security. It includes data on known threats—such as ransomware or malware strains.
Threat hunting, on the other hand, applies this information to live environments. It looks for signs that similar behaviours are unfolding inside an organisation.
While separate, the two disciplines reinforce each other. Mature SOC teams use threat intelligence to guide hunts, and in turn, threat hunting can identify new threats to feed back into intelligence platforms.
Threat hunting usually follows a structured approach.
In hypothesis-driven hunting, analysts start with an assumption about potential malicious activity. For example, “An attacker may be using stolen credentials to move laterally within finance systems.” The hunter then queries relevant data sources to prove or disprove the hypothesis. This approach is structured, repeatable, and well suited to organisations with strong telemetry and experienced analysts.
Intelligence-driven hunting is guided by external or internal threat intelligence. Hunters use reports on active adversaries, malware campaigns, or attack techniques to search for related behaviours in their own environment. This methodology helps organisations focus on relevant threats and aligns hunting efforts with real-world attacker activity.
Analytics-driven hunting relies on statistical analysis, baselining, and behavioural analytics to surface anomalies. Instead of starting with a specific hypothesis, hunters examine deviations from normal activity such as unusual login times, abnormal data transfers, or rare process executions. This approach is effective for uncovering unknown or novel threats.
Situational hunting is triggered by events such as new vulnerabilities, public breach disclosures, or changes in the threat landscape. For example, hunters may proactively search for exploitation activity after a critical vulnerability is announced. While reactive in nature, this approach is still proactive compared to traditional alert-based response.
Threat hunting often focuses on behavioural evidence rather than static indicators.
Effective threat hunting prioritises IOAs, as they are more resilient against evasion and better aligned with modern attack techniques.
Threat hunting techniques describe how analysts investigate data to uncover threats.
Threat hunting tools provide the visibility and analytical capabilities needed to support investigations.
SIEMs centralise logs from across the environment and enable querying, correlation, and timeline analysis. They are often the starting point for threat hunting activities.
XDR solutions correlate telemetry from endpoints, email, cloud, identity, and network layers. This cross-domain visibility helps surface complex attack patterns and reduces investigative blind spots.
These tools provide context on adversaries, malware, and campaigns. Hunters use intelligence to guide hypotheses and prioritise investigations.
Tools such as YARA and Sigma allow hunters to create custom detection logic and reusable queries tailored to their environment.
Effective hunting depends on access to high-quality data, including endpoint telemetry, network traffic, identity logs, and cloud audit trails. The depth and retention of this data directly impact hunting effectiveness.
Platforms like Trend Vision One provide integrated access to these data sources, enabling analysts to pivot quickly and investigate threats across multiple layers.
A global logistics firm noticed unusual login patterns in Microsoft 365. Threat hunters used location-based filtering and audit logs to trace back to a compromised partner account. The account had been used to send phishing emails internally.
In a recent Trend Micro threat-hunting research casenews article, threat hunters investigated persistent command-line activity across several high-privilege endpoints. Analysis revealed abuse of legitimate tools such as PowerShell and WMI to establish backdoors without dropping files.
This technique, known as "living off the land," is designed to avoid detection by security software. It remains one of the most common challenges in enterprise threat detection.
A Trend Micro Vision One customer identified anomalous DNS requests tied to a trusted third-party vendor. Deeper inspection showed the vendor’s environment had been compromised and was being used for lateral movement.
A threat hunting framework provides a structured approach for proactively identifying threats that evade automated detection. Rather than relying on ad hoc investigations, a defined threat hunting process ensures hunts are repeatable, measurable, and aligned with organisational risk.
The following threat hunting lifecycle outlines how security teams can build and operationalise an effective threat hunting framework.
Every threat hunt starts with a clear hypothesis. This is a testable assumption about potential malicious activity based on threat intelligence, known attacker techniques, environmental risk, or recent incidents.
For example, a hypothesis might focus on credential abuse in cloud environments or lateral movement using built-in administrative tools. Effective hypotheses are specific, actionable, and mapped to adversary behaviour frameworks such as MITRE ATT&CK.
Once a hypothesis is defined, analysts identify the data sources required to validate it. Threat hunting data may include endpoint telemetry, authentication logs, network traffic, DNS activity, or cloud audit trails.
Scoping ensures that investigations focus on relevant systems and timeframes. Analysts also verify data quality, coverage, and retention to avoid gaps that could weaken conclusions.
During the investigation phase, hunters analyse data using queries, behavioural filters, and correlation techniques. When suspicious activity is identified, analysts pivot to related signals such as associated accounts, processes, or network connections.
Threat hunting is inherently iterative. Initial findings often lead to new questions, expanded scope, or refined hypotheses as patterns emerge.
Hunters determine whether the evidence supports or disproves the original hypothesis. If malicious activity is confirmed, analysts assess the scope of the threat, identify affected assets, and evaluate attacker persistence and movement.
If no supporting evidence is found, the hypothesis may be refined or documented as a negative result, which still contributes to organisational understanding and detection maturity.
Confirmed threats are escalated to incident response teams with full context. This includes timelines, affected systems, attacker techniques, and recommended containment actions.
Clear escalation paths ensure that threat hunting findings transition quickly into remediation, reducing dwell time and limiting potential impact.
One of the most critical steps in a threat hunting framework is feedback. Behaviours identified during hunts are translated into new detection logic, analytics, or alerting rules within SIEM, XDR, or EDR platforms.
Hunts also highlight visibility gaps, prompting improvements in logging, telemetry collection, or sensor deployment.
Each hunt should be documented, including the hypothesis, data sources, investigation steps, findings, and lessons learned. Retrospective analysis allows teams to apply new detection logic to historical data, uncovering missed activity or extended dwell time.
Over time, this continuous improvement loop strengthens the threat hunting framework, improves detection coverage, and aligns proactive threat hunting more closely with evolving attacker techniques.
When getting started, focus on visibility here first:
Trend Vision One provides advanced capabilities for threat hunting:
It supports security teams in detecting stealthy attacks, reducing dwell time, and uncovering threats before they escalate.
Threat hunting is the proactive process of searching for threats that evade automated security tools using manual investigation and hypothesis testing.
A threat hunter proactively detects, investigates, and mitigates cyber threats within networks, preventing breaches and enhancing organizational security.
Threat hunting is proactive and happens before an incident is confirmed; incident response is reactive and begins after detection.
Threat intelligence provides known threat data; threat hunting applies this intelligence to identify suspicious activity in live environments.
IOAs focus on behaviours and tactics; IOCs are forensic evidence of past attacks like file hashes or IP addresses.
Tools include SIEMs, XDR platforms, threat intelligence feeds, and scripting utilities like YARA or Sigma.