Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]