
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

I don’t think anyone would dispute that cyber security has a problem with buzzwords. These are words that start with a fixed
definition but
ultimately are
dilute
d
over time. One of these so-called buzzwords is
‘
threat detection
.
’
But I am here to tell you that this is one buzzword that we should reclaimed and that organizations should spend more time considering.
Before we go digging into threat detection, let’s first define what it is. You'd be forgiven for wondering why we need to
define
threat detection in the first place. Especially since the term seems very straightforward.
Regardless, because of the aforementioned dilution it is still important. For us, we will say that t
hreat detection is a process that detects malicious activities by observing behaviours
known to be associated with specific malware
.
Threat detection contrasts with
threat protection.
Threat protection
is a process that detects malicious code through signatures. These signatures rely
almost exclusively
on digital
characteristics
of the malware
, instead of their behaviours
. These could include hash values, strings of text, IP addresses, domains
or other similar things
.
Simply put, threat
protection
looks are what the threat
is
, and threat
detection
looks at what the threat
does
. Recall Dave Bianco’s infamous “Pyramid of Pain.” Threat protection aligns to the lower three levels, while threat detection corresponds to the upper three. This means that threat detection is more robust. Especially when faced with
modifications
like code recompilation or infrastructure changes.
Threat detection, compared to threat protection, has a lot of real-world advantages for security teams. One of the biggest advantages relates to false positives. False positives for threat protection relate to indicators and are binary in nature.
A
n analyst spending significant time investigating an alert that is a false positive will
ultimately
have a reductive outcome
for security teams
.
This is because
the investigation will
likely
lead to the disabling of the rule or removal of the indicator.
Threat detection, however, looks for suspicious behaviours. This doesn't mean you won't see false positives. Analysts will find power users leveraging Microsoft Office or batch scripts in
ways you never thought possible. Their analysis, however, will not be wasted. Instead, that behaviour can be whitelisted without losing the protection provided
by the threat detection
content
.
This means more reliable detections moving forward.
This also results in security team
s
b
e
ing able to better profile “what is normal”
in their environment
.
[hubspot type=cta portal=7924572 id=ec572148-ebc2-449f-8ccc-0353bc94df5e]
While some people believe that threat detection requires new and fancy tools, the opposite is actually true. Threat detection only requires the platforms and tools most teams already have. These include a
SIEM
or data lake platform and an
endpoint agent for logging
.
Of course, t
here are other tools and technologies, such as EDR, that can make security teams’
lives
easier. But these tools aren’t required to get started.
With
logging
at the host level
in place, and a platform to analyze those logs, the next important step is
threat detection content
. Content in this context refers to the queries deployed in a SIEM or data lake platform. This content will often be written in a platform-specific syntax. These could include
As we mentioned, threat detection content differs from traditional threat protection content. Instead of relying on traditional atomic indicators
to detect malicious activity,
it looks for specific behaviors
used by malware and could
include things such as:
Threat Detection content comes from some different sources. The most common sources are open-source repositories, default platform content, and in-house development. Each of these methods has their own advantages and drawbacks (which we covered
here
).
However, at the end of the day, threat detection content originates from
threat intelligence
.
Organizations should also consider that mature threat detection capabilities have other advantages.
Specifically, t
hey enable organizations to adopt new and more advanced capabilities, like
threat hunting
. This is because capabilities like threat hunting rel
y
on many of the same prerequisites that threat detection does. This means that time spent developing a solid underpinning for threat detection is not a temporal benefit. Instead, it is one that will continue to pay dividends well into the future.
While the
cyber security industry is plagued with buzzwords, it doesn’t mean that those buzzwords don’t have value. Instead, it means that those words must be looked at critically to ensure we see the virtual forest for the digital trees. ‘Threat detection’ is one such concept that has tremendous value for organizations
.
Interested in finding out more about threat detection? Check
out what threat hunters believe are the
free tools that everyone in the infosec industry should be using
.
[hubspot type=cta portal=7924572 id=ae832f8f-83db-4b26-8f4d-f37f258623e2]

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.