Staff Picks for Splunk Security Reading September 2022

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

Ryan Fetterman

@iknowuhack

On Detection: Tactical to Function Part 6: What is a Procedure? by Jared Atkinson at SpecterOps

"In this post, Jared Atkinson (Chief Strategist @ SpecterOps) continues his series on in-depth detection engineering ("On Detection: Tactical to Function") — this time exploring the "P" (Procedural) level of "TTP" (Tactics, Techniques, & Procedures). Jared defines procedures as 'the most detailed implementation steps of how an adversary carries out an attack.' Understanding the art of the possible at the procedural level is critical for understanding the quality and potential limitations of your detection approach and specific search logic. Jared has a great writing style that often connects metaphorically to concepts outside the realm of cybersecurity, making the content technical, but also accessible. This series of posts directly contributes to disambiguating a current "grey area" in defensive cybersecurity — the way we measure and communicate about the concept of "coverage" with regard to ATT&CK® technique detection."

Haylee Mills

@7thdrxn

Making Risk Based Alerting Magick, an On Demand Lunch and Learn with Splunk

"Okay, I know. It's my *own* Lunch and Learn webinar but it's about the cybersecurity thing I'm most excited about; especially for burnt out SOC teams who aren't crafting detections this way! Lots of people have been talking about behavior aggregation detection methodologies for years but I still don't see it put in plain language or an ability to do so in most products. In this talk I cover the basics of what RBA is, but also about how to plan out your implementation for success. The crowd also asks a bunch of great questions!"

Sydney Howard

@letswastetime

Developing an Intelligence-Driven Threat Hunting Methodology by Joe Slowik at Gigamon

"Everyone talks about threat hunting, but few organizations have people dedicated to the function. This white paper provides a thorough overview into requirements to establish a successful threat hunting program at your organization. I particularly like the call out that the threat hunting process is iterative rather than linear. This can be key for growth as you build upon previous work to truly mature your threat hunting program."

Mick Baccio

@nohackme

The Los Alamos Club by Strider

"I have read more incident reports in the past few weeks than I care to, and I know I'm not alone in that feeling. While distraction doomscrolling, I came across an amazing read from the team at Strider, detailing a connection between Los Alamos Labs, China’s ‘Thousand Talents Program’ and the Southern University of Science and Technology, SUSTech. Going back to the late 80’s, “at least 162 scientists who had worked at Los Alamos returned to the PRC to support a variety of domestic research and development (R&D) programs.” Fortuitous coincidence? Long term intelligence goals? Let me know what you think."

Audra Streetman

@audrastreetman

Exmatter: Clues to the future of data extortion by Daniel Mayer, Threat Researcher at Stairwell and Shelby Kaba, Director of Special Operations at Cyderes

"In this blog, security researchers explore a new tactic in data exfiltration that was recently employed by a BlackCat ransomware affiliate (aka ALPHV or Noberus). BlackCat is believed to be the successor to Darkside and BlackMatter ransomware and has gained attention for its use of Rust, a cross-platform programming language.

The researchers examined a sample that appears to be an updated version of the Exmatter data exfiltration tool. Exmatter steals specific file types before the ransomware is deployed. The tool now comes with an Eraser feature to corrupt files on the victim machine by overwriting portions of each file with data from other files (see this diagram).

Threat Researcher Daniel Mayer points out that corrupting data on a victim's machine could eliminate the need for an encryptor, which ransomware operators often develop for affiliates in exchange for a cut of the profit under the RaaS model. BlackMatter affiliates may have grown frustrated with encryptors after a flaw in 2021 allowed the cybersecurity firm Emsisoft to create a decryptor for victims. Corrupting data in lieu of encryption would allow affiliates to retain 100% of the ransom payment, creating an incentive to, 'strike it out on their own, replacing development-heavy ransomware with data destruction.'"

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.