Splunk Security Content for Threat Detection & Response: September Recap
In September, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security Content Update (ESCU) app (v5.14.0, v5.15.0, v5.15.2). With these releases, there are 21 new analytics and 7 new analytic stories now available in Splunk Enterprise Security via the ESCU application update process.
Content highlights include:
- New Suspicious Cisco Adaptive Security Appliance Activity analytic story. The new story turns ASA/FTD perimeter telemetry into early warnings for logging suppression, unauthorized configuration changes, anomalous connection patterns, sudden syslog volume drops, and potential C2, strengthening visibility on edge devices where EDR coverage is limited. These improvements provide clearer, more trustworthy alerts and dashboards, faster edge-device triage, and stronger confidence that their controls map correctly to real-world techniques.
- Cisco ASA coverage for the ArcaneDoor campaign. These detections, developed in conjunction with Cisco Talos, deliver high-signal visibility at the network edge, an area that typically sits outside EDR. Built around the real-world exploit path on VPN web services that cover CVE-2025-20333 (RCE), CVE-2025-20362 (unauthorized/privileged access), and the newly disclosed CVE-2025-20363, this story focuses on what intruders actually do on ASA/Secure Firewall during and after exploitation (logging suppression and post-exploitation signals), with refreshed Snort/Intrusion mappings for hunting and triaging.
- Introduced new detections for the LAMEHUG malware, which leverages outbound requests to Hugging Face APIs (e.g., Qwen 2.5-Coder-32B-Instruct) to generate AI-driven Windows command chains. Common behaviors include execution of systeminfo, net start, tasklist, dsquery, and recursive file copy operations into %ProgramData%\info\. Initial delivery vectors often involve phishing ZIPs with .pif binaries disguised as PDF or image viewers.
- The Team tagged relevant existing content to cover behaviors associated with ObjectivyStealer, a stealthy information-stealing malware targeting web browsers, messaging apps, cryptocurrency wallets, and local system files. It evades detection by operating from user profile or temp directories and maintains persistence using registry run keys or scheduled tasks. This mapping enhances detection of credential theft, session hijacking, and encrypted exfiltration to remote C2 infrastructure.
- Secret Blizzard: Added detections for suspicious use of certutil.exe to install root certificates from temp directories using the -addstore root command. This tactic, seen in post-exploitation scenarios, may be used to intercept HTTPS traffic, impersonate trusted services, or bypass endpoint defenses. These analytics detect certificate installation from .tmp files, use of the -f (force) and -Enterprise flags, and other high-risk trust modifications that can lead to persistent compromise.
- Introduced a new analytic story focused on detecting NotDoor, a malicious Outlook macro backdoor linked to APT28 (Fancy Bear). This story adds detections for suspicious Outlook macro creation, persistence via LoadMacroProviderOnBoot, and disabling of security dialogs all techniques leveraged by NotDoor to exfiltrate data, upload files, and execute remote commands via email-based triggers
The team also published a blog focusing on Audit Logs and Microsoft Office365 Copilot Activity Logs using Splunk Add-on for Microsoft Office 365. This Splunk Add-on allows Splunk to pull service status, service messages and management activity logs from Office 365 Management API.
For all our tools and security content, please visit research.splunk.com.
Title
Related Articles
Filter
Category
Blog Limit
3
Category
security
Sort Category Shuffle Order
true
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.

Splunk Security Content for Threat Detection & Response: November Recap
Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.

Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.

AI for Humans: A Beginner’s Field Guide
Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.

Splunk Security Content for Threat Detection & Response: November 2025 Update
Learn about the latest security content from Splunk.

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.