Staff Picks for Splunk Security Reading November 2022

Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.

Check out our previous staff security picks, and we hope you enjoy.

Mike Polisky

Leveraging the SPARTA Matrix by aerospace.org

"The Space Attack Research and Tactic Analysis (SPARTA) matrix visualizes the relationship between tactics and techniques/sub-techniques for space-cyber threats. Inspired by and very similar to the MITRE ATT&CK Framework."

Sydney Howard

@letswastetime

The Detection Series: Open Scripting Architecture, AppleScript, and JavaScript for Automation by Tony Lambert, Brandon Dalton, Cat Self, and Ferdous (“Sal”) Saljooki

"I really enjoyed this online webinar and accompanying blog post as they dive into unique threats affecting macOS systems. They explain how the macOS native scripting capabilities like AppleScript are very easily exploitable, similar to how an adversary might exploit PowerShell on Windows OS. There are several fantastic hunting and detection ideas throughout the webinar, which are shared in detail and tied right back to the MITRE ATT&CK Framework."

Ryan Fetterman

@iknowuhack

Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries by the Symantec Threat Hunter Team

"This month I'm highlighting new Symantec Threat Hunter Team reporting on Billbug (aka Lotus Blossom, DRAGONFISH, Spring Dragon), a long-active state-sponsored APT. This report is notable because, among multiple victims, the threat actors are targeting a certificate authority (CA). CA's are managers and issuers of digital certificates that underpin the fundamental trust of internet security. Compromising private keys or root CA servers enable complex attacks, which subvert these trust relationships. The actors use many common living-of-the-land binaries for Discovery: AdFind, NBTscan, Ping, Tracert...This underscores the value of a risk-based alerting (RBA) approach. Alone, these applications may not draw scrutiny, but with RBA they can be linked into a suspicious chain of reconnaissance activity!"

Shannon Davis

@DrShannon2000 / @DrShannon2000@infosec.exchange

The Hunt for the Dark Web's Biggest Kingpin by Andy Greenberg for WIRED

"There have been high-level discussions around the takedown of the dark web marketplace AlphaBay before. This series goes further and does an amazing job discussing the people and actions involved in great detail."

Tighe Schlottog

@workape

Sysdig TRT uncovers massive cryptomining operation leveraging GitHub Actions by Crystal Morin, Threat Research Engineer at Sysdig

"A fascinating read, and cautionary tale, of ensuring that you are instrumenting and have detections around your GitHub actions data. While this attack was built and worked around free tier accounts, it could have easily been executed against paid/enterprise tier accounts with the same effect. The breakdown of the attack, with all the relevant IOC's associated with all aspects of the attack within GitHub actions, is a must read for anyone interested in CI/CD security or DevSecOps in general."

Audra Streetman

@audrastreetman / @audrastreetman@infosec.exchange

Iranian hackers breached the agency that hears federal worker grievances by Ellen Nakashima, Tim Starks and Aaron Schaffer for The Washington Post

"In an alert this month, CISA revealed that a U.S. federal network was compromised as early as February by Iranian government-sponsored APT actors. The Washington Post's Cybersecurity 202 newsletter reports that an Iranian hacking group known as Nemesis Kitten is believed to have exploited Log4Shell (CVE-2021-44228) to install crypto-mining software on the network of Merit Systems Protection Board, which hears grievances from federal employees. It's unclear if the crypto-mining software was used as a cover for espionage, or if these threat actors were motivated by financial gain. Regardless, this incident serves as a reminder that the Log4j vulnerability is endemic and continues to pose a threat to government agencies and the private sector. "

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.