Human-Led Threat Hunting Methodology with METMOX for Seamless Security

The Cybersecurity and Infrastructure Security Agency (CISA) shared that Kaseya's VSA software was used to push a malicious PowerSheII script The VSA software

According to data from CrowdStrike, 68% of detections from the last three months were not malware-based - identifying more than 65,000 potential intrusions, or approximately 1 potential intrusion every 8 minutes — 24 hours a day, 365 days a year.

Metmox Human-led Threat Hunting Methodology

Threat hunting is the adoption of simple and unique methods, standards, and practices, it is a unique ability to see and stop the most sophisticated threats. With top-level proactive threat hunting, anomaly detection, statistical & behavioral analysis, our threat hunters have helped our clients achieve a secure environment.

Our Human-led Threat Hunting Methodology finds a needle in a haystack — described below, to systematically detect threats at scale:

With each new threat, Metmox extracts new insights to drive continuous advancements in automated detections and human threat hunting.

Outcome-Focused Security

Our experts look at the behaviors and activities associated with malicious screen capture activity, including the writing of image files to disk, the deployment and execution of file compression and archival utilities, and anomalous traffic to unknown external hosts that may indicate potential exfiltration activity. Our Threat hunters proactively investigate lateral movement activity, enriched by contextual system events.

Our mission is to expose advanced interactive threats and deliver actionable contextual threat intelligence through our shared factory operations. Metmox supports fully and co-managed security teams around the globe by delivering alerts in Real-time. These alerts enable security responders to act quickly and decisively against live threats in their environment. But finding the threat is only half the battle — it is crucial that defenders contain and remediate the threat quickly before any damage can be done.

Difficulty in Finding threats? known adversaries or insider threats or outside attackers? Our Team is constantly monitoring the threat landscape to detect new types of attacks, critical vulnerabilities, and the behavior of cybercriminals and other adversaries.

Recommendations for Seamless Security