Cybersecurity Threat Detections
Cybersecurity Threat Detections
Cybersecurity Threat Detections
In this complex and unpredictable world, Splunk is foundational to keeping organizations like yours secure and resilient so you
can detect and respond to threats faster, evolve with the needs of the business and innovate with confidence. Your organization’s
security and resilience depend upon your networks talking to each other, and your security tools analyzing all of your data and
providing relevant insights.
To be resilient, we believe you need to be able to see your full infrastructure and all its data — at full fidelity. It’s essential to creating
security operations that are flexible enough to adapt to new threats, emerging technologies and ever-increasing
data volumes.
You need faster detection and response techniques. You can do this by harnessing all of your data, automating processes that will
identify new threats in record time and allowing your team to focus on their highest priorities.
This is how we improve our cyber resilience, which allows us to accelerate business growth, ensure privacy and compliance, and
continue innovating.
We’re invested in solving customer challenges in this evolving world by strengthening our
security and observability offerings. This is why we’ve put together this list of MITRE
ATT&CK tactics and corresponding threat detections and analytic stories from the
Splunk Threat Research Team (STRT) to combat the latest threats, so that you can
stay resilient in the face of complexity and uncertainty.
Patrick Coughlin
Senior Vice President, Global Technical Sales
3
As technologies evolve, cybercriminals have become even The MITRE ATT&CK framework can also help:
more sophisticated. Threat actors are constantly evolving their • Inform the security operations center (SOC) on how
approach — from data encryption and exfiltration, to double to prioritize alerts and detections.
extortion attacks that leak proprietary data if their demands • Identify and assess risks, control gaps and risk appetite.
aren’t met. • Provide a framework for security governance and maturity.
• Recommend new data sources based on quantifiable
If that wasn’t bad enough, financially-motivated cybercrime is also
risk reduction.
on the rise, outpacing state-sponsored activity to account for more
• Sharpen a view of attack paths, improving a security team’s
than 80% of interactive intrusions. This influx of malicious attacks
knowledge and skills.
is projected to cost organizations a hefty $10.5 trillion annually
by 2025. Attackers are also taking advantage of vulnerabilities
in supply chains, targeting the operational weaknesses of
The nirvana solution: ATT&CK + Splunk
organizations and exploiting new attack surfaces opened up by As threats evolve, so does the ATT&CK framework. To keep up
cloud services. with new and emerging threats, security teams need to adapt and
update their threat detection and response capabilities at the same
To protect against these cyber threats, we need to reimagine rate as their adversaries. Splunk Enterprise Security (ES), Splunk
and reinforce our security defenses, and be resilient in the face Security Essentials (SSE), and Splunk Enterprise Security Content
of ever-evolving threats. In this e-book , we examine some of the Updates (ESCU) help organizations prepare for threats by mapping
major threat tactics and techniques defined by the MITRE ATT&CK MITRE ATT&CK to Splunk’s Analytic Stories — security guides that
framework , and how security teams can be better prepared (and include narrative background on attack techniques and threats
equipped) with the help of Splunk. accompanied by Splunk searches, machine learning and security
orchestration, automation and response (SOAR) playbooks.
Enter MITRE ATT&CK
These powerful components work together to help you detect,
MITRE ATT&CK is a knowledge base of common tactics, techniques
investigate and respond to signs of threats in your environment.
and procedures (TTPs) that documents the ways in which threat
Periodic updates help you continually uplevel your defenses.
actors operate, ultimately serving as a playbook of TTPs seen and
Analytic Stories are complements to traditional indicators of
reported out in the wild. Organizations refer to MITRE ATT&CK
compromise (IOCs), which are lagging and often ephemeral. By the
to classify attacks, assess risk and improve their overall security
time you detect them, attackers have usually changed their URLs,
posture to gain a better understanding of adversaries’ behavior, so
IP addresses and other artifacts, making the IOCs obsolete. In
that they can identify and implement relevant threat detections.
contrast, ESCU helps you monitor for common/perennial adversary
In essence, ATT&CK is a standardized, easily accessible and globally tactics and techniques. Once you’ve identified signs of these
acknowledged threat language that security specialists can look to threats in your environment, you can use searches and playbooks to
for threat intelligence and to help bolster their security posture. help you decide whether to investigate further.
4
MITRE ATT&CK use cases
Meet
Splunk’s
threat
Map defense Threat hunting Investigate ID actors/ Integrate
controls incidents groups solutions
Different applications for the MITRE ATT&CK taxonomy within Splunk research
Below are some of the ways the ATT&CK framework
team
can be applied within Splunk:
MITRE ATT&CK Tactics In order to break down and address the potential stages of this tactic,
Ready to take your threat response to the next level? Below the techniques identified by the MITRE ATT&CK framework include
we break down the major MITRE ATT&CK threat tactics and the initial collection of information, determining the network range of
techniques, along with examples of how to respond with Splunk. the target, finding access points and open ports, as well as mapping
the organization’s network. Essentially, these are all the steps that
Reconnaissance (TA0043) support the collection of source information, better informing the
adversary to select or identify their target.
6
Execution (TA0002) Containers are another way for attackers to run code and control
systems. By abusing a container administration service, they can
control an environment’s containers remotely. And deploying a
Threat tactic: to run malicious code container into an environment allows them to run code and evade
Why these threats exist defenses from the inside.
Threat execution refers to the techniques used by an attacker to run Another execution tactic includes abusing task scheduling to
or control malicious code on a local or remote system. Techniques facilitate initial or recurring execution of malicious code at a specified
that run malicious code are often paired with a number of other date and time. Adversaries may also deploy malicious payloads via
tactics, like infiltrating a network or stealing data. For example, an shared modules or gain access to third-party software suites installed
adversary might use a remote access tool to run a PowerShell script within an enterprise network. They also abuse system services or
that does remote system discovery. daemons to execute commands or programs and by using social
engineering to lure a user to take specific actions, like clicking on a
How these threats are executed bogus link or downloading a malicious file.
Adversaries may abuse command and script interpreters to execute
commands, like PowerShell, AppleScript, Unix, Windows and Python.
These interfaces and languages allow users to interact with computer
systems, and are a common feature across many different platforms.
Attackers can use them to discover information, execute code,
open windows, send keystrokes and interact with almost any open How to detect and respond with Splunk
application locally or remotely. Some command shells allow attackers
full access to almost any aspect of the target’s system.
Splunk Threat Detection: Linux Decode Base64 to Shell
• How it works
This threat identification searches for base64 being decoded and
passed to a Linux shell. Base64 encoding is often abused and used
to carry confusing malicious payloads disguised as legitimate code.
7
Persistence (TA0003) They also use scripts that are automatically executed at boot or logon
initialization to establish persistence. Initialization scripts can be used
to perform administrative functions, which may often execute other
Threat tactic: to maintain a foothold programs or send information to an internal logging server. These
Why these threats exist scripts can vary based on operating system and whether applied
locally or remotely.
Once a threat actor gets into a target’s systems, persistence
invariably pays off — trumping almost every other tactic in an Adversaries can also create a new account to maintain access to
attacker’s playbook. To successfully maintain their foothold, the victim systems, whether it’s a local, domain or cloud account. They
attacker must preempt any number of interruptions that could cut also modify system-level processes to repeatedly execute malicious
off their access, including system restarts or updated credentials. payloads using launch agents, system services, Windows services
This tactic covers access, action or configuration changes that allow and launch daemons.
the perpetrator to move laterally (and, above all, covertly) within the
compromised account or system, replacing or hijacking legitimate
code with their own.
• How it works
This threat detection identifies the creation of a new setting by
alerting about a specific correlating event. Though the creation of a
new federation is not necessarily malicious, the event needs to be
followed closely, as it could indicate credential abuse.
8
Privilege Escalation (TA0004)
Threat tactic: to gain higher-level permissions
Why these threats exist higher-level privileges. Other techniques include tampering with
system-level processes to repeatedly execute malicious payloads,
After bad actors enter and explore a network with unprivileged
modifying the configuration settings of a domain and using system
access, sometimes they have to go even further and get elevated
mechanisms that trigger execution based on specific events.
permissions to fulfill their objectives. The techniques they use to gain
those permissions are grouped under privilege escalation. Common
approaches involve taking advantage of system weaknesses,
misconfigurations and vulnerabilities.
Bad actors try to evade detection in different ways, depending on the How to detect and respond with Splunk
stage and type of attack. They exploit any and all vulnerabilities in
the victim’s environment, abuse credentials, modify permissions and Splunk Threat Detection: Circle CI Disable Security Job
attributes, hijack operating systems, inject code and hinder or disable
security tools and other defensive mechanisms. Along the way, they • Splunk Analytic Story
do everything they can to hide and delete evidence of their presence Dev Sec Ops
and behavior in the target’s environment.
• MITRE ATT&CK Tactics
To evade defenses, adversaries modify settings, access and Persistence
other components of the victim’s environment. By modifying
• MITRE ATT&CK Techniques
the configuration settings of a domain, they can gain access to a
Compromise Client Software Binary
centralized way to manage how computers and accounts can act and
interact with each other on the network. By modifying access tokens,
• Kill Chain Phase
they can operate as different users or system security contexts to
Actions on Objectives
perform actions and bypass access controls. They also modify and
impair defensive mechanisms like firewalls and antivirus protection, • How it works
as well as other detections that could reveal their activity. This threat detection looks for CircleCI jobs on the build phase that
have been disabled and provides the analyst with the job name,
the user which disabled the CI job. This action would be done by an
attacker to avoid defenses or disrupt services.
10
Credential Access (TA0006) X
Threat tactic: to steal account details S #
L
H
Why these threats exist 7
Credential access consists of techniques for stealing account details
like usernames and passwords. There are many techniques used
to get credentials, including keylogging and credential dumping. In
addition to being extremely effective, this type of attack is much
harder to find than other types of initial access techniques because
it will look like the legitimate use of a user account. This is an
extremely cheap and efficient attack to gain access to user accounts
and information.
G ! A
In a large-scale credential stuffing attack , the attacker will set up
a bot that’s able to automatically log into multiple user accounts
simultaneously, all the while faking different IP addresses. The stolen
credentials will then be run against a long list of websites, checking
for successful logins, personally identifiable information, credit
cards or other valuable data from the compromised accounts. By
How to detect and respond with Splunk
running this process in parallel across multiple channels, the need to
repeatedly log into a single service is reduced. Account information Splunk Threat Detection: 0365 Disable MFA
is also retained for future use, including phishing attacks or other
transactions enabled by the compromised service. • Splunk Analytic Story
Office 365 Detections
• How it works
This threat detection identifies when multifactor authentication
has been disabled, what entity performed the action and
against what user. 11
Discovery (TA0007) Smart businesses can blunt the impact of a breach by denying
intruders this opportunity to get oriented. Many business leaders are
familiar with attackers’ common methods for breaching systems.
Threat tactic: to figure out Understanding this discovery phase of a cyberattack can make
your environment you more prepared to counter such activities and downstream
consequences. The actions to take are tactical but they can make
Why these threats exist all the difference by enabling businesses to stay on strategy and
Discovery consists of techniques an adversary may use to gain sustain operations.
knowledge about the system and internal network. These techniques
help hackers observe the environment and orient themselves before
deciding how to act. They also allow adversaries to explore what they
can control and what’s around their entry point in order to discover
how it could benefit their current objective. Native operating system
tools are often used toward this post-compromise information-
gathering objective.
How to detect and respond with Splunk
How these threats are executed Splunk Threat Detection: Windows AdFind Exe
Cyber adversaries are better than ever at infiltrating systems. And
• Splunk Analytic Story
once they gain access to a company’s network , hackers often stay
NOBELIUM Group, Domain Trust Discovery
in the shadows to conduct reconnaissance. They silently watch and
learn how to exploit security weaknesses like default settings to
• MITRE ATT&CK Tactics
achieve their objectives by surprise. In the MITRE ATT&CK framework ,
Discovery
this digital prowling is known as “discovery.”
• MITRE ATT&CK Techniques
Remote System Discovery
• How it works
This threat detection looks for the execution of adfind.exe with
command-line arguments that it uses by default. Specifically the
filter or search functions.
12
Collection (TA0009)
Threat tactic: to source data relevant
to the target
• How it works
The threat detection identifies a 7z.exe spawned from Rundll32.
exe or Dllhost.exe. It’s assumed that the adversary has brought in
7z.exe and 7z.dll. Additional coverage may be required to identify
the behavior of renamed instances of 7z.exe.
13
Lateral Movement (TA0008) Bad actors can alternatively hijack users’ pre-existing sessions
to move laterally throughout a network, subsequently using valid
credentials to log into a service specifically designed to accept
Threat tactic: to move through remote connections. They may also use alternate authentication
your environment material, such as password hashes, Kerberos tickets and
application access tokens, to bypass normal system access
Why these threats exist controls and move laterally.
At this stage, the threat actor is attempting to quickly (yet
thoroughly) move through your environment. And they aim to cover
the most ground by any means possible once they have infiltrated
the victim’s network.
In order to carry out their mission, bad actors need to explore the
network to locate and gain access to their target. In this stage,
they apply numerous techniques aimed at entering and controlling
remote systems, so achieving their malicious objectives often
How to detect and respond with Splunk
involves cycling through multiple systems and accounts through
lateral movement to install remote access tools. To accomplish this Splunk Threat Detection: Mimikatz PassTheTicket
mission, they’ll often use legitimate credentials with native network CommandLine Parameters
and operating system tools to stealthily cover their whereabouts.
• Splunk Analytic Story
How these threats are executed Active Directory Kerberos Attacks
Adversaries may also use internal spear phishing techniques to • Kill Chain Phase
gain access to additional information or exploit other users within Exploitation
the same organization who already have access to accounts
or systems within the environment. In this case, they often try • How it works
to trick an unsuspecting person into clicking on a malicious The following analytic looks for the use of Mimikatz command line
link or downloading an infected attachment, which serves as a parameters used to execute “PassTheTicket” attacks. Red teams
springboard for lateral movement to other parts of the network. and adversaries alike may use the pass the ticket technique by
taking advantage of stolen Kerberos tickets to move laterally within
an environment, bypassing normal system access controls.
14
Command and Control However, as they infect an entire network , adversaries also have
to cover their tracks, which compels them to use a host of stealth
(TA0011) techniques that mask command and control activities. One of these
techniques is embedding commands in the traffic between the client
Threat tactic: to control and server of application layer protocols, such as web, file transfer,
compromised systems mail and DNS protocols, to blend in with existing traffic. Another
includes communication via removable media, where adversaries can
Why these threats exist execute command and control functions on potentially disconnected
networks using devices like USB drives to transfer commands
In the command and control phase, malicious attackers attempt
between compromised systems.
to communicate with the very systems that they infected and
compromised. Their objective is to take complete control of their targets Adversaries may also discreetly take over a network by simply adding
and use their targets for nefarious purposes, often through phishing junk data to protocol traffic, using steganography or impersonating
attacks, vulnerable software or security holes in browser plug-ins. legitimate protocols. Also, rather than relying on any inherent
protections, they could employ a known encryption algorithm to
Once threat actors infect a device or system on the network , they
conceal command and control traffic.
employ a series of techniques to communicate with the compromised
systems within a victim network. It’s also not uncommon in this phase
for adversaries to mimic normal traffic levels by using application layer
protocols to avoid triggering security alerts, evade network filtering and
generally dodge any other unwanted scrutiny.
How to detect and respond with Splunk
How these threats are executed Splunk Threat Detection: TOR Traffic
• How it works
This threat detection looks for network traffic identified as The
Onion Router (TOR), a benign anonymity network that can be
abused by malicious attackers for a variety of nefarious purposes.
15
Exfiltration (TA0010) scheduled transfers performed only at certain times of the day or
at certain intervals, which provide a perfect foil by blending into
normal traffic patterns.
Threat tactic: to steal proprietary data
Threat actors could alternatively rely on existing , legitimate external • Kill Chain Phase
web services to exfiltrate data, as popular web services often tend Exploitation
to provide a significant amount of cover simply because the targeted
organization was likely already using the services prior to the attack. • How it works
This threat detection identifies PowerShell commands
Adversaries may also attempt to exfiltrate data via a physical medium, using the WindowStyle parameter to hide the window on
such as a removable USB drive, external hard drive, cell phone, MP3 the compromised endpoint. This combination of command-
player or other common storage device, which would then become line options is suspicious because it overrides the default
the final exfiltration point before the hackers altogether removed PowerShell execution policy, attempts to hide its activity from
the data from the targeted system. They may also pilfer data via the user and connects to the internet.
16
Impact (TA0040) remote drives to render stored data irrecoverable. This includes
manipulating data by inserting, deleting or changing it in an attempt
to influence external outcomes, hide activity or affect a business
Threat tactic: to manipulate, interrupt or process or decision.
destroy your systems and data
Destruction can also include defacement of both internal and
Why these threats exist external content and web properties, which can in turn cause loss
In this phase, the adversary is actively trying to manipulate, of revenue, credibility in the marketplace and reputation. To that
interrupt or destroy targeted systems and data. The impact phase end, adversaries may execute denial of service attacks that degrade
consists of techniques that adversaries use to disrupt availability or altogether block the availability of websites, email services, DNS
or compromise integrity by manipulating business and operational and web-based applications by choking the system with traffic and
processes. Techniques used for impact include destroying or causing it to crash.
tampering with data. In some cases, business processes might
appear intact and running smoothly on the surface — however, in
reality, attackers may have covertly altered them to access, steal or
compromise data; conduct cyberespionage, and otherwise cause
disruptions and wreak havoc on targeted systems.
How these threats are executed How to detect and respond with Splunk
Altogether, the impact stage consists of a wide range of techniques
Splunk Threat Detection: Ransomware Notes Bulk Creation
that adversaries use to disrupt, compromise, destroy and manipulate
the integrity and availability of network operations, processes and • Splunk Analytic Story
systems, devices and data, as well as the surrounding environment. Clop Ransomware, DarkSide Ransomware, BlackMatter
These techniques are particularly dangerous as they can result in Ransomware
instantaneous disruption to processes, or may result in more long-
term damage to the environment or systems. • MITRE ATT&CK Tactics
Impact
Among their techniques, adversaries may interrupt system and
network resources by blocking, deleting or locking down access • MITRE ATT&CK Techniques
to accounts, or by manipulating credentials to gain unauthorized Data Encrypted for Impact
access and removing access by legitimate users.
• Kill Chain Phase
Adversaries can also aim to destroy data and files — either on Exploitation
specific systems or en masse — to interrupt systems, services
and network resources as well as overwrite files on local and • How it works
This threat detection identifies a large number of instances of
ransomware notes to the infected machine. This behavior is a good
indication of whether the ransomware note filename is new for the
security industry or the ransomware note filename is not in your
ransomware lookup table list for monitoring.
17
Ready to kickstart your
security operations?
Check out Splunk Security Essentials, and start solving hundreds of
different security challenges for free.
Learn more
Splunk, Splunk> and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand
names, product names or trademarks belong to their respective owners. © 2023 Splunk Inc. All rights reserved.