Advanced Hunting
Threat hunting stands apart from traditional security methods by being proactive, not reactive. While most security tools wait for an alert, threat hunting actively seeks out threats and suspicious activity that may have slipped past your defenses. This approach is essential for:
- Finding new and unknown threats before they cause damage.
- Spotting suspicious anomalies that might signal a cybercriminal at work.
- Discovering additional malicious artifacts associated with known attackers.
How can Google Threat Intelligence help you?
Google Threat Intelligence provides a powerful platform for threat hunters, fueled by a massive, continuously updated database. This data comes from our security partners and, most importantly, our global community. Our hunting capabilities help you:
- Find new, unknown malicious activity and threat actors.
- Spot suspicious anomalies that might be abused by cybercriminals.
- Find additional malicious artifacts used by known attackers.
LiveHunt is a service that allows you to monitor the real-time stream of files submitted to Google Threat Intelligence. You can create your own YARA rules, and when a file matches a rule, you'll be notified instantly. This lets you classify new threats by family, discover new malicious IoCs that antivirus engines might have missed, and find files, URLs, IPs or domains with specific properties.
LiveHunt leverages the immense scale of Google's data with the flexibility of YARA, providing the perfect tool for monitoring any new suspicious activity based on your own custom criteria. All matches from the job will appear in your IOC Stream, giving you an immediate view of the results. You can also download matched files for further study, and the entire process can be automated using our REST API.
RetroHunt allows you to apply a YARA rule to our extensive historical dataset to discover older versions of attacks. A single RetroHunt job scans over 600 TB of files from the past year, helping you understand how a threat has evolved over time.
You can find detailed information about the creation of YARA rules in the YARA documentation.
Use case
Hunting for malware behavior
Once found suspicious behavior in a malware’s analysis, we can create a YARA rule that matches against it. Use the structure tool to help writing the rule faster, and learn how to tune your rule to reduce noise or false positives.
How to do it
This YARA rule triggers if a file communicates with the selected IP address and modifies a registry whose path contains the specified string. |
Updated about 13 hours ago