Security professionals have become all too familiar with the threat posed by phishing. Whether it’s a convincing looking email asking an employee to click a link to update their login credentials or a surprise text from the CEO asking them to send over gift card codes for a customer, phishing attacks have only continued to grow over the years.
For 2023 alone, 33 million data records are expected to be compromised due to phishing attacks. With so many potential threats poised to end up in employees' inboxes, how can security teams prevent these potential threats before they turn into security incidents?
Fortunately, Splunk SOAR offers a powerful set of enrichment response playbooks that can help identify malicious threats like these based on digital identifiers. For this month’s edition of Playbook of the Month, we’ll look at one set of playbooks from Splunk SOAR’s enrichment response pack, that focuses on Identifier Reputation Analysis.
Identifier Reputation Analysis (IRA) is a method used in cybersecurity and digital forensics to evaluate the trustworthiness or risk associated with a digital identifier, such as IP addresses, email addresses, domain names, or usernames. The goal of IRA is to detect and mitigate potential threats by analyzing the historical behavior and reputation of these identifiers.
The Dispatch Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE D3FEND’s approach for identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.
The Dispatch Identifier Reputation Analysis playbook automatically enriches an incident with reputation details using pre-built community playbooks from VirusTotal and PhishTank. Here’s how to use it:
And with that, the Identifier Reputation Analysis Playbook is ready to use.
Watch the video to see how the pre-built workflow for Identifier Reputation Analysis can be used in action and how it improves your organization’s threat landscape.
Suppose a SOC team wants to incorporate helper playbooks into their custom workflow. Let’s take an example where a SOC needs to receive alerts via email for specific malware indicators with reputation scores tagged on them. We will use Splunk SOAR to accomplish this task in just a few simple steps:
With the steps above, we have customized our workflow on top of a pre-built helper playbook that normalized reputation scores from VirusTotal.
This example shows how easy it is to build a custom workflow using Splunk SOAR. With its powerful tools and capabilities, Splunk SOAR enables SOC teams to automate workflows and streamline their security operations. Be sure to check out research.splunk.com/playbooks to explore even more useful playbooks. We look forward to hearing about your experience with this month’s featured playbooks as well as any other playbooks you’ve recently implemented. We’ll be back next month with more playbooks and demos, but until then, get out there and get automating!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.