Welcome to our discussion on a crucial aspect of modern cybersecurity: threat hunting. Today, we’re moving beyond the traditional reactive approaches and delving into why a proactive threat hunting strategy is not just beneficial, but essential for uncovering more threats and staying ahead of adversaries.
You might be familiar with the term threat hunting, but the distinction between “reactive” and “proactive” can make all the difference. Let’s break down these concepts and illustrate how adopting a proactive mindset can transform your security posture.
When we talk about threat hunting, it’s helpful to categorize threats based on what we know about them and their capabilities. This is often visualized in four quadrants:
Known Knowns: These are the most straightforward: known threats using known capabilities. Think of well-documented attack methods from established threat actors like APT29 or APT34. Threat intelligence feeds are rich with this information, providing indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) to search for. Hunting for known knowns is entirely reactive. You’re essentially waiting for intelligence to tell you what to look for based on past incidents. While valuable, if this is your sole focus, you’re only scratching the surface.
Unknown Knowns: This quadrant covers unknown threats using known capabilities. Imagine you’re hunting for evidence of a tool commonly used by a known APT group, like PSExec or Mimikatz. In the process, you might stumble upon a different, previously unidentified attacker leveraging that same tool. Here, your threat intelligence pointed you to a known capability, but you’ve proactively uncovered a new threat actor. This approach is a mix – partly reactive (due to the known capability) and partly proactive (due to finding an unknown threat).
Known Unknowns: Here’s where we enter truly proactive territory. This involves looking for unknown capabilities used by known threats. Even the most sophisticated threat intelligence won’t reveal every tool or technique an adversary, especially a nation-state actor, has in their arsenal. They invest heavily in developing new methods that haven’t been seen in the wild. By hunting for novel or unexpected behaviors from known adversaries, you’re anticipating their evolution rather than just reacting to their documented history.
Unknown Unknowns: This is the most challenging category: unknown capabilities used by unknown threats. Discovering these often comes down to deep analytical work, anomaly detection, or sometimes, sheer luck during a hunt focused elsewhere. These are the threats you don’t know you don’t know about.
If your threat hunting program exclusively targets “known knowns,” it’s 100% reactive. You’re waiting for an intel report before you act. When you start exploring “unknown knowns,” you’re about 50% reactive and 50% proactive. However, to be truly proactive, you need to venture into the left side of this landscape, hunting for “unknown capabilities,” regardless of whether the threat is known or not. This means assuming attackers are constantly innovating.
The concept of “Black Swan” events, popularized by Nassim Nicholas Taleb, is incredibly relevant to cybersecurity. Historically, it was believed that all swans were white until black swans were discovered in Australia. This metaphor describes events that meet three criteria:
Think about major cybersecurity incidents: the SolarWinds supply chain attack, the exploitation of MS17-010 in WannaCry ransomware, or sophisticated attacks on industrial control systems. These were often outliers, had a massive impact, and, in retrospect, the vulnerabilities and attack paths became clear.
A purely reactive threat hunting approach, focusing only on known knowns, leaves you highly vulnerable to Black Swan events. Threat intelligence, by its nature, primarily reports on what has already happened and been observed.
Consider Taleb’s analogy of the turkey: fed every day by the farmer, the turkey believes life is good and the farmer is its friend. Its confidence grows with each feeding. The Black Swan event for the turkey is the week before Thanksgiving. This illustrates how a system built on past observations can catastrophically fail when an unpredicted event occurs. In infosec, we must avoid being the turkey.
Many organizations focus their resources on threats they deem “probable.” This often aligns with the “known knowns” – threats that are well-documented and have a high likelihood of appearing.
The critical area many miss is Possible but Not Probable. These are events or capabilities that could impact your environment, but you might not deem them likely, perhaps because no specific threat intelligence has linked them to an actor targeting your sector. If you’re only hunting for what’s probable (based on existing intel), you’re missing a significant portion of the threat landscape. A proactive approach acknowledges that if an attack vector is possible, it’s worth investigating, even if it’s not currently flagged as “probable.”
So, how can you shift your threat hunting from a reactive stance to a more proactive one, and start uncovering those potential Black Swans?
Start with “Known Unknowns”:
Expand to “Unknown Knowns”:
The cybersecurity landscape is dynamic, with attackers constantly evolving their tools and techniques. Relying solely on reacting to known threats is like driving while only looking in the rearview mirror.
By incorporating hunts for “known unknowns” (new tricks from old dogs) and “unknown knowns” (familiar tools in new, unknown hands), you significantly broaden your detection capabilities. This proactive stance doesn’t just prepare you for the threats of today, but also helps you build resilience against the unexpected “Black Swan” events of tomorrow.
Start thinking beyond the latest threat intelligence report. Consider what’s possible in your environment, not just what’s been reported as probable. By doing so, you’ll be far better equipped to defend your organization against a wider spectrum of cyber threats.
Our products are designed to work with
you and keep your network protected.
Insane Cyber © All Rights Reserved 2025