Cybersecurity and the Crisis in Ukraine

Like most of us around the world, I’ve been shocked by the current situation in Ukraine. I’m saddened by the images of families being torn apart and fleeing their homes. This brings to mind the story of my own grandmother, who had to leave her native country of Austria, with nothing more than a small bag and my infant mother in her arms. It feels trivial for me to write a corporate blog about the invasion unfolding before our eyes, but we’ve received a number of questions from customers and the community about the increased risk of cyberattacks during the conflict.

I want to make sure I address this very real concern they have – and one that we’re qualified to help with. Splunk has been closely monitoring developments related to the Russian invasion and we wanted to share an overview of our tools, guidance and support of organizations during this crisis as they are advised to adopt a heightened security posture. Splunk is working closely with our partners and government agencies to share the latest information about emerging threats along with detections and recommended mitigations. We plan to update this blog with further guidance as the situation evolves.

We’ve also taken action to enhance our cyber resiliency:

Defending Against Potential Cyberattacks

If you are a Splunk customer who is concerned about attacks on your environment in this time of heightened risk, please consider reviewing the information below.

High Value Data Sources for Advanced Persistent Threat Hunting

The image below shows our coverage across MITRE ATT&CK.

Supporting Information

Customers who use core Splunk or Splunk Enterprise Security (ES) can reference the following Splunk blogs:

Index of tips and tricks for hunting across numerous data sources:https://www.splunk.com/en_us/blog/security/hunting-with-splunk-the-basics.html

DNS Hunting:
https://www.splunk.com/blog/2018/03/20/hunting-your-dns-dragons.html

Microsoft Sysmon:
https://www.splunk.com/blog/2018/06/21/a-salacious-soliloquy-on-sysmon.html

Additional components of sysmon that are available to hunt:
https://www.splunk.com/en_us/blog/security/sysmon-the-b-sides-event-codes-that-might-not-get-as-much-attention-just-in-time-for-bots.html

https://www.splunk.com/en_us/blog/security/process-hunting-with-a-process.html

Hunting with Commercial Cloud Providers (AWS and Azure): O365: https://www.splunk.com/blog/2018/08/27/the-future-is-cloudy-with-a-chance-of-microsoft-office-365.html

Azure AD: https://www.splunk.com/blog/2018/08/31/i-azure-you-this-will-be-useful.html

AWS VPC: https://www.splunk.com/blog/2018/09/24/go-with-the-flow-network-telemetry-vpc-data-in-aws.html

Threat Advisory: STRT-TA02 - Destructive Software This threat advisory focuses on WhisperGate, the destructive malware that targeted Ukrainian organizations: https://www.splunk.com/en_us/blog/security/threat-advisory-strt-ta02-destructive-software.html

SA-Investigator: A free Splunk app that is designed to sit on top of Splunk Enterprise Security and can be used to hunt and investigate assets, identities, file hashes, and file/process names. In deployments that do not use Enterprise Security but have a Common Information Model (CIM), you may still receive some value from hunting across data models like Network Traffic, Endpoint, Authentication, and much more.

Reference: https://splunkbase.splunk.com/app/3749/
Blog: Being Your Own Detective with SA-Investigator

OT Security Add-on for Splunk: Customers with operational technology (OT) such as SCADA and industrial control systems (ICS) may find the OT Security Add-on to Enterprise Security to be especially helpful. CISA has explicitly called out cyber threats to U.S. critical infrastructure such as power and water utilities.

Reference: https://splunkbase.splunk.com/app/5151
Blog: CISO’s Guide to Complete Security for Industrial Control Systems

Enablement

Workshops: Splunk Solution Engineers offer tailored workshops that are delivered live online or in-person.

Boss of the SOC (BOSS) Platform: For the last four years, Splunk security experts with experience in nation state hunting have developed scenarios in our Boss of the SOC (BOTS) competition and training to mimic the tactics, techniques, and procedures used by Russian APT groups. These training exercises can be found on the BOSS platform, at https://bots.splunk.com.

Resources from CISA

Splunk is working closely with CISA as a member of the agency’s Joint Cyber Defense Collaborative. CISA's catalog of free cybersecurity services and tools can help organizations shift from being reactive to proactive in their cyber defense. The list includes Splunk’s Synthetic Adversarial Log Objects (SALO) framework, Splunk Attack Detection Collector, and Splunk Attack Range. In addition, CISA has linked to a number of alerts and advisories on their “Shields Up” webpage with the latest information regarding Russia-linked cyber threats along with recommended mitigation measures.

----------------------------------------------------
Thanks!
Shawn Bice

No results