Skip to content
  esdebe blog

esdebe blog

Innovating IT for over 20 years

  • Absolute Data Storage Freedom
  • esdebe.com
  • Toggle search form

Hunting in the Shadows: TIPs, the Dark Web, and APTs

Posted on August 1, 2025 By Guru Esdebe

Right, so I was chatting with Charlie the other day, and we got deep into the weeds about proactive threat hunting. Charlie’s been wrestling with some pretty persistent threats lately, so our conversation naturally gravitated towards leveraging Threat Intelligence Platforms (TIPs) and dark web monitoring. Thought I’d share the gist of it, as it might resonate with some of you facing similar challenges.

“Look,” Charlie started, “we’re drowning in alerts. How do we actually hunt, instead of just reacting?” My answer? TIPs are the key, but they’re only as good as the data you feed them. We’re talking about curating a relevant feed of threat intelligence, specifically targeting APT groups known to target our sector. Think of it this way: if you know they’re after financial data and use spear-phishing campaigns leveraging compromised banking credentials, your TIP needs to be ingesting intel about those specific groups, their TTPs (Tactics, Techniques, and Procedures), and indicators of compromise (IOCs) related to banking credential theft.

We then discussed building threat hunting playbooks. It’s not just about having intel; it’s about operationalising it. For example, based on TIP data about APT ‘X’ using specific PowerShell scripts for lateral movement, a playbook could involve: 1) SIEM queries for PowerShell events matching known malicious script signatures, 2) investigating user accounts that triggered these events, and 3) checking for unusual network connections originating from those compromised hosts. It’s a chain reaction, fuelled by intel. Think of it as building a decision tree. If ‘this’ happens, investigate ‘that’.

And then we dove into the ATT&CK framework. Charlie was a bit sceptical at first, but I explained how mapping TIP intelligence to MITRE ATT&CK techniques helps identify gaps in our security controls. Say our TIP tells us APT ‘Y’ frequently uses ‘Credential Dumping’ (T1003) after gaining initial access. By mapping this to ATT&CK, we can see if we have adequate monitoring and prevention mechanisms in place for credential dumping activities. Are we logging LSASS memory dumps? Do we have adequate protections against Mimikatz? If not, that’s a gap we need to address.

Lateral movement is always a concern, so we spent some time on that. TIP data can provide insights into the specific tools and techniques APTs use to move laterally within a network. For example, if intel suggests APT ‘Z’ favours Pass-the-Hash attacks, our hunt should focus on identifying unusual authentication patterns, especially those involving privileged accounts. This means monitoring for Kerberos ticket requests, anomalous logon times, and suspicious use of administrative tools.

Privilege escalation is another area where TIPs can shine. Let’s say our TIP reveals that APT ‘A’ often exploits a specific vulnerability to escalate privileges. Armed with this knowledge, we can proactively scan our systems for that vulnerability and implement mitigating controls. We can also set up alerts to detect attempts to exploit that vulnerability in real-time. The key is to be proactive, not reactive.

And of course, data exfiltration. This is the endgame for most APTs. TIP data can reveal the specific methods APTs use to exfiltrate data, such as using specific protocols (e.g., DNS tunnelling), encrypting data with a known algorithm, or staging data in a particular location before exfiltration. Armed with this knowledge, we can implement detection mechanisms to identify these activities. For instance, monitoring for unusual DNS traffic, large file transfers to unusual destinations, or suspicious file modifications in sensitive directories.

Then, Charlie steered the conversation to dark web monitoring. “Is it really worth the effort?” he asked. My take is that it’s a valuable addition to the arsenal, especially for identifying compromised credentials before they’re used in an attack. We need to be scouring dark web marketplaces and forums for mentions of our company, our employees, or leaked credentials that could be used to gain access to our systems. It’s like having an early warning system. If we find compromised credentials, we can proactively reset passwords and prevent potential breaches.

We use a combination of automated tools and manual analysis to monitor the dark web. The automated tools scan for specific keywords and patterns, while the manual analysis helps us filter out false positives and identify more nuanced threats. It’s important to remember that dark web monitoring is not a silver bullet, but it can provide valuable insights into potential threats. Integrating the data into our TIP enhances our overall situational awareness. We can correlate dark web findings with internal security events to identify potential compromises in real-time.

Finally, it’s about integrating everything with your SIEM. The TIP enriches SIEM data with threat intelligence, providing context to alerts and enabling more effective incident response. You’re not just seeing an alert about a suspicious IP address; you’re seeing that it’s associated with APT ‘B’ and their known TTPs. This allows you to prioritise alerts, investigate incidents more efficiently, and ultimately, respond more effectively.

So, to tie it all together: it’s about targeted intel, operationalised into playbooks, mapped to ATT&CK, feeding your SIEM, and backed up by dark web monitoring. It’s a continuous cycle of learning, adapting, and improving your threat hunting capabilities. It isn’t a simple fix, but it is a worthwhile endeavour.

Esdebe News

Post navigation

Previous Post:

Untangling the Encryption Knot: A Chat with Holly about Data Governance in a Multi-Vendor World

Next Post:

SDN Security: A Deep Dive into Protecting Your Network’s Nervous System

The latest IT developments and solutions from our world leading partners in data management and protection.

| Blog menu

  • Esdebe News
  • iX Newsletters
  • ManageEngine
  • Webinars

| Latest posts

  • On-Premise Backup: My Disaster Recovery Deep Dive

  • Backup Bliss: Taming the Data Protection Beast

  • Silos Be Gone: SDS as the Great Integrator

  • Container Storage Crossroads: Navigating the Multi-Vendor Maze

  • Data Recovery: A Chat with Rhys About Getting Your Backups Back

| Past posts

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • April 2023
  • March 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022

Copyright © 2023 esdebe.com

Powered by PressBook WordPress theme