- Scenario
- You are facing the 2026 trend: ransomware affiliates skip encryption entirely and go straight to silent mass exfiltration, then extort on the threat of publication. The endpoint sees legitimate reads. The SOC sees nothing.
- Pain
- Volume-based DLP misses staged exfiltration (attacker stages inside the perimeter, then moves out spread across hours via legitimate CDN ranges). TLS inspection has retreated under HSTS preload + ESNI + QUIC. Your only durable signal is the network egress — and most defenders are weakest exactly there.
- How Zero Hunt solves it
- The deep-packet ML model classifies flow metadata (timing, fan-in/out, byte distribution, ASN destination, JA3/JA4 hashes) as packets traverse. A host that flips from net-importer to net-exporter, a sustained outbound burst to a never-seen ASN, an SD-WAN tunnel carrying 10× its usual volume — all light up during the burst, in time to cut the link.
- Outcome
- Discovery happens during the exfiltration window, not the morning after when the data is gone. Regulator countdowns (GDPR Art. 33, NIS2 Title 13) start at detection, not at "should have known".