Like most of us around the world, I’ve been shocked by the current situation in Ukraine. I’m saddened by the images of families being torn apart and fleeing their homes. This brings to mind the story of my own grandmother, who had to leave her native country of Austria, with nothing more than a small bag and my infant mother in her arms. It feels trivial for me to write a corporate blog about the invasion unfolding before our eyes, but we’ve received a number of questions from customers and the community about the increased risk of cyberattacks during the conflict.
I want to make sure I address this very real concern they have – and one that we’re qualified to help with. Splunk has been closely monitoring developments related to the Russian invasion and we wanted to share an overview of our tools, guidance and support of organizations during this crisis as they are advised to adopt a heightened security posture. Splunk is working closely with our partners and government agencies to share the latest information about emerging threats along with detections and recommended mitigations. We plan to update this blog with further guidance as the situation evolves.
We’ve also taken action to enhance our cyber resiliency:
If you are a Splunk customer who is concerned about attacks on your environment in this time of heightened risk, please consider reviewing the information below.
The image below shows our coverage across MITRE ATT&CK.
Customers who use core Splunk or Splunk Enterprise Security (ES) can reference the following Splunk blogs:
Index of tips and tricks for hunting across numerous data sources:
https://www.splunk.com/en_us/blog/security/hunting-with-splunk-the-basics.html
DNS Hunting:
https://www.splunk.com/blog/2018/03/20/hunting-your-dns-dragons.html
Microsoft Sysmon:
https://www.splunk.com/blog/2018/06/21/a-salacious-soliloquy-on-sysmon.html
Additional components of sysmon that are available to hunt:
https://www.splunk.com/en_us/blog/security/sysmon-the-b-sides-event-codes-that-might-not-get-as-much-attention-just-in-time-for-bots.html
https://www.splunk.com/en_us/blog/security/process-hunting-with-a-process.html
Hunting with Commercial Cloud Providers (AWS and Azure):
O365: https://www.splunk.com/blog/2018/08/27/the-future-is-cloudy-with-a-chance-of-microsoft-office-365.html
Azure AD: https://www.splunk.com/blog/2018/08/31/i-azure-you-this-will-be-useful.html
AWS VPC: https://www.splunk.com/blog/2018/09/24/go-with-the-flow-network-telemetry-vpc-data-in-aws.html
Threat Advisory: STRT-TA02 - Destructive Software
This threat advisory focuses on WhisperGate, the destructive malware that targeted Ukrainian organizations: https://www.splunk.com/en_us/blog/security/threat-advisory-strt-ta02-destructive-software.html
SA-Investigator: A free Splunk app that is designed to sit on top of Splunk Enterprise Security and can be used to hunt and investigate assets, identities, file hashes, and file/process names. In deployments that do not use Enterprise Security but have a Common Information Model (CIM), you may still receive some value from hunting across data models like Network Traffic, Endpoint, Authentication, and much more.
Reference: https://splunkbase.splunk.com/app/3749/
Blog: Being Your Own Detective with SA-Investigator
OT Security Add-on for Splunk: Customers with operational technology (OT) such as SCADA and industrial control systems (ICS) may find the OT Security Add-on to Enterprise Security to be especially helpful. CISA has explicitly called out cyber threats to U.S. critical infrastructure such as power and water utilities.
Reference: https://splunkbase.splunk.com/app/5151
Blog: CISO’s Guide to Complete Security for Industrial Control Systems
Workshops: Splunk Solution Engineers offer tailored workshops that are delivered live online or in-person.
Boss of the SOC (BOSS) Platform: For the last four years, Splunk security experts with experience in nation state hunting have developed scenarios in our Boss of the SOC (BOTS) competition and training to mimic the tactics, techniques, and procedures used by Russian APT groups. These training exercises can be found on the BOSS platform, at https://bots.splunk.com.
Splunk is working closely with CISA as a member of the agency’s Joint Cyber Defense Collaborative. CISA's catalog of free cybersecurity services and tools can help organizations shift from being reactive to proactive in their cyber defense. The list includes Splunk’s Synthetic Adversarial Log Objects (SALO) framework, Splunk Attack Detection Collector, and Splunk Attack Range. In addition, CISA has linked to a number of alerts and advisories on their “Shields Up” webpage with the latest information regarding Russia-linked cyber threats along with recommended mitigation measures.
----------------------------------------------------
Thanks!
Shawn Bice
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.