Because the Internet of Things (IoT) plays a major role in modern society and business, IoT and ICS threats are consistently in development. Security incidents and threat research have both shown that more than half of internet- active IoT devices have been impacted by attackers’ malicious actions.
In this paper, we will show how we built our large-scale automated threat hunting system, and use 6 hunting examples we analyzed in the past year to give an overview of current trends in threat development.
- Published by TXOne Research
- Written by Mars Cheng and Patrick Kuo from TXOne’s Global Threat Research Group
- With contributions from TXOne Threat Research, TXOne Signature Research and Trend Micro Inc.
- Acknowledgements: The authors would like to thank Michael Cheng and his team for their contributions to the previous work of hunting systems. The team members listed in alphabetical order are Babylon Tien, Chizuru Toyama, Eric M Kao, Fisher Wu, James Chang, Joe Chang, Linwei Tsao, Mesh Wu, Samuel Chen, and William K Chang. We would also like to thank Marco Balduzzi and Numaan Huq from Trend Micro Research for conducting peer review of our work.