top of page

If You’re Not Deploying APT Hunting, 20% Of The Most Dangerous Threats Will Go Undetected

This guest blog was contributed by Zachary Folk, Camelot Secure


What is Advanced Persistent Cyber Threat Hunting, and why is it important?

Zachary Folk, Camelot

In cybersecurity, the threat landscape is becoming more complex daily. For example, global cybercrime costs are expected to grow by 15 percent annually over the next five years, reaching USD 10.5 trillion annually by 2025. In addition, Techjury states that 64% of companies worldwide have experienced at least one cyber attack.

Perhaps more notable, IBM states that, on average, it took 207 days to discover a breach in 2022 and an additional 70 days to contain it effectively. This amount of time spent means the average time to fully address a breach in 2022 was 277 days. In perspective, if a breach occurred on January 1st of that year, it would take until October 4th to identify and contain the breach based on the average time frame.

Hundreds of days to discover a breach gives attackers enough time to infiltrate deeper into the system, access sensitive information, and causes more significant harm to the organization resulting in expensive ransomware, material damage, or irreparable reputation harm.

The cybersecurity defense misconception is that relying on traditional security measures, such as detecting and responding to alerts, will keep bad actors out. Instead, organizations must adopt a proactive approach to threat detection and mitigation to stay ahead of hackers; this is where Advanced Persistent Threat Hunting comes in.


Advanced Persistent Threat (APT) is a sophisticated and highly-targeted attack designed to evade traditional security measures and remain undetected for an extended period. APTs are typically launched by well-funded and organized groups, such as nation-state actors or organized criminals, and usually have severe consequences for the targeted organization.

APT Hunting is proactively seeking out and identifying advanced and persistent cyber threats actively trying to infiltrate an organization's networks and systems. It is a continuous and iterative process that involves collecting, analyzing, and interpreting data from various sources to detect potential threats and prevent them from causing damage.


In addition, APT Hunting involves multiple techniques and technologies, including network monitoring, log analysis, integrated threat intelligence feeds, and behavioral analysis. As a result, analysts can identify and mitigate potential threats by monitoring suspicious activity and behavior patterns before they can cause damage.


Successful APT Hunting requires a combination of skilled analysts, robust technologies, and a strong cybersecurity culture within the organization. In addition, it is an ongoing process that must be continually updated and refined as new threats emerge and evolve.


Why Do You Need An APT Hunting Approach?

Traditional security measures like firewalls, vulnerability scans, and Security Operations Centers (SOCs) can cover 80% of a network's security, but the remaining 20% will leave organizations vulnerable to attacks. APT Hunting fills these gaps by mapping potential threats, thus providing a systematic approach to identifying and mitigating advanced threats that traditional security measures may miss.

APT Hunting Provides:

  1. Improves early detection: Threat hunting allows organizations to proactively search for signs of malicious activity, improving the early detection of potential threats. Detecting threats early is paramount to preventing the 20% of security incidents that go unnoticed from escalating.

  2. Addresses the limitations of traditional security measures: Traditional security measures, such as firewalls, intrusion detection systems, and antivirus software, are designed to detect known threats and have limitations in detecting new and advanced threats. Threat hunting complements these measures by providing a proactive and comprehensive approach to detecting threats.

  3. Reduces the impact of security incidents: By detecting and responding to threats before they can cause harm, threat hunting helps to reduce the impact of security incidents and protect critical assets and data.

  4. Improves overall security posture: Threat hunting helps organizations to stay ahead of the evolving threat landscape, improving their overall security posture. It also helps organizations detect and respond to potential threats more quickly and effectively, reducing the impact of security incidents and protecting critical assets.

How does APT Hunting Compare To A Traditional Threat Hunt?

Advanced Persistent Threat (APT) hunting and traditional threat hunting differ in several ways. Traditional threat hunting typically focuses on identifying and mitigating immediate threats actively attacking an organization's networks and systems. This approach involves analyzing data logs, network traffic, and other sources of information to identify potential threats, such as malware infections or unauthorized access attempts. Traditional threat hunting is often reactive, responding to incidents as they occur.

On the other hand, APT Hunting is an offensive approach, accomplished by finding threat patterns inside the network using AI/ML technologies mapped with the MITRE ATT&CK™ framework to include real-time threat intelligence data feeds.

APT Hunting is a more sophisticated cybersecurity process. It involves advanced threat intelligence, behavioral analysis, and machine learning algorithms to detect and respond to the 20% of threats that can cause the most harm.

In summary, traditional threat hunting involves analyzing data logs, network traffic, and other sources of information to identify potential threats. In contrast, APT Hunting is an offensive approach that uses AI/ML technologies, and real-time threat intelligence data feeds to find threat patterns inside the network. In addition, APT Hunting is a more sophisticated cybersecurity process that uses advanced threat intelligence, behavioral analysis, and machine learning algorithms to detect and respond to the 20% of threats that can cause the most harm. However, both approaches are essential components of a comprehensive cybersecurity strategy and should be integrated to provide layered defenses against cyber threats.

How does APT Hunting work?

Critical steps for a successful APT Hunt include:

  1. Integrate as many data sources and intel threat feeds as possible.

  2. Automate the ability to baseline what “normal” looks like across the entire cyberspace under protection.

  3. <