Blogs & Stories

Trustwave Blog

The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.

Trustwave Revamps Continual Threat Hunting Enabling Significantly More Hunts and Unique Threat Findings

Trustwave is relaunching its Advanced Continual Threat Hunt (ACTH) platform with a new patent-pending methodology that enables Trustwave researchers to conduct significantly more human-led threat hunts, resulting in a 3x increase in behavior-based threat findings. These discoveries might otherwise go undetected by current EDR tools.

“Traditional threat detection and prevention tools based on IoCs and EDRs alone are not sufficient to stop sophisticated threat actors who know how to evade detection,” said Shawn Kanady, Global Director of Trustwave SpiderLabs Threat Hunt Team. “Our patent-pending Advanced Continual Threat Hunting platform, paired with our human-led, hypothesis-based approach, allows us to detect unknown threats that others don’t much faster.”

Advanced Continual Threat Hunting is a Tactics, Techniques and Procedures-(TTPs) focused threat-hunting platform and methodology based on the NIST MITRE ATT&CK framework. The solution allows the elite Trustwave SpiderLabs Threat Hunting team to conduct more higher-quality, human-led threat hunts per year to find indicators of behavior across Trustwave’s global client base and multiple Endpoint Detection and Response (EDR) tools. In addition, ACTH supports various Endpoint Detection and Response tools which gives Trustwave access to more queries that that can be used to find threats.

As new IOCs are discovered, they are ingested into the SpiderLabs Threat Intelligence Platform. All Trustwave clients within the Fusion platform benefit from the intelligence derived from SpiderLabs Advanced Continual Threat Hunts.

The improved threat hunt capability continuously scans a client’s environment searching for threat actors and can raise awareness of compromise before an attacker can exploit it by proactively discovering malicious activity and anomalous behavior.

Trustwave Advanced Continual Threat Hunt provides:

  • Identification of behaviors that are opportunities of compromise in 100% of hunts that we perform
  • Discovery of adversaries that evade initial detection by security technologies
  • Discovery of new Indicators of Compromise
  • Discovery of open risks that attackers exploit
  • Best practice risk mitigation recommendations
  • Better outcomes for protection and detection capabilities across all Trustwave clients as threat intelligence is enriched with new threat hunt findings
  • Report findings and incident tickets in the Trustwave Fusion platform

The solution supports the most popular tools available, such as Microsoft Defender for Endpoints, Palo Alto Networks Cortex XDR, SentinelOne, VMware Hosted EDR (Carbon Black Response), and VMware Enterprise EDR (Carbon Black Threat Hunter).

The Advanced Continual Threat Hunting Difference

Trustwave SpiderLabs Threat Hunters have meticulously and continuously developed thousands of queries across multiple EDR technologies and mapped them to the MITRE ATT&CK framework. 

Unlike automated threat hunts, which only search for known indicators of compromise, Trustwave threat hunters bring an additional layer of expertise to the process by studying the behaviors used by the most sophisticated threat actors in the world. This procedure enables SpiderLabs to detect threats others can’t by leveraging a human-led approach with a patent-pending threat-hunting platform and methodology. 

This level of sophistication is accomplished by researching targeted threat actors' Tactics, Techniques, and Procedures (TTPs) and using this information to hunt for evidence of Indicators of Behavior (IoB). As a result, the service provides deep insight into unintentional risks in a client’s environment and those imposed by threat actors based on evidence of behavior in client networks and endpoints.

Armed with the latest threat intelligence from internal and external sources, Trustwave proactively hunts for indicators of behavior in real-time to uncover zero-days, unknown security gaps, and hidden threats while providing actionable recommendation to mitigate risk to an organization.

Additionally, this new technique also helps Trustwave improve its capabilities. As new threat hunt findings are discovered, this information is added to Trustwave SpiderLabs Threat Intelligence Platform to benefit Trustwave’s global security team and existing services and products.

The primary takeaway is that Trustwave’s new patent-pending methodology is human-led advanced threat hunting, conducted at scale using the latest threat actor intelligence to detect what others can't much faster. Trustwave can discover malicious behavioral activity that existing security technologies cannot.