Hello, everyone! Welcome to the Splunk staff picks blog. Each month, Splunk security experts curate a list of presentations, whitepapers, and customer case studies that we feel are worth a read.
Check out our previous staff security picks, and we hope you enjoy.
"If you are running or own any Fortinet equipment please, please update. This is a nasty vulnerability that gets attackers unauthenticated RCE on a FortiOS device. It has even caught off guard some of us at #STRT who run Fortinet in our house. The attack only requires an actor to send a specially crafted HTTP request with a "Report Runner" User-Agent string and a X-Forwarded-For header — super easy to execute and is being actively exploited in the wild."
"Last year the Splunk Threat Research Team released Melting-Cobalt as a way to help defenders identify Cobalt Strike Teamservers in the wild. The Microsoft Security Response Center team released a blog on their additions to Melting-Cobalt. MSRC added a new source – RiskIQ, and showcased their usage of Melting-Cobalt within Azure Functions (a serverless solution) and then taking the data to Microsoft Sentinel and Azure Data Explorer. This blog is a great publication for defenders to see how dynamic Melting-Cobalt may be with integrations, along with the ability to ingest the data into any platform. With the addition of RiskIQ, Melting-Cobalt has the ability to hunt for Teamservers across four services. "
"Process creation is a crucial data source for monitoring endpoint behavior. This article explains where to find it and how to use it."
"What better way to understand a threat than by emulating it yourself? Threat emulation is an immensely beneficial tool we can use when threat hunting. This post walks through the steps to a successful emulation including creating an environment to test, such as the Splunk Attack Range. Emulating the attack will generate endpoint and network telemetry you can later analyze to better understand your environment and create more efficient threat hunting queries."
"Bias in AI algorithms is a challenging problem that can have severe, real-world consequences – previously found in systems affecting healthcare, criminal justice, and hiring decisions. This article in the MIT Technology Review outlines details on an ambitious new project, announced at the Conference for Machine Learning in Security (CAMLIS) 2022 by Dr. Rumman Chowdhury and Dr. Subho Majumdar – a "Bias Bounty" program for identifying and mitigating algorithmic biases, using a crowd-sourcing, competitive approach. Anyone interested can check out the first challenge – open now, at bugbounty.ai!"
"I always love articles like these for the fascinating breakdown of events, but it breaks my heart that these informants were caught thanks to sloppy operational security practices by the CIA. Opsec is quite difficult to do well, but knowing the sort of manipulation we use to recruit valuable informants and that their lives are potentially on the line, this sort of thing shouldn't happen."
Linux Rootkits Part 1: Introduction and Workflow by Harvey Phillips
"Have you ever found yourself wanting a deeper understanding of how Linux rootkits work? If so, then this is the post (it's actually a series of nine posts) for you. This series walks through Linux rootkits from head to toe. It starts out simple, explaining what a kernel object is. Each additional post adds more and more capabilities to the code until you have all of the components required for a fully functional rootkit. The best part of the series is that there are tons of examples and explanations that make it all very hands-on if you want it to be."
"While multi-factor authentication is a recommended practice, it is not the magic button for security. All too often we hear about MFA phishing and MFA exhaustion attacks. As a case in point, the 0ktapus campaign has been incredibly successful using these techniques, catching companies such as Cloudflare, Twilio, and perhaps Doordash in their tentacles."
"In this survey of women who work in cybersecurity, more than 71% said that they had been made to feel uncomfortable during an interaction in the field because of their gender. This is a problem and I am glad Huntress is asking women about their experiences. It is also clear from this survey that mentorship, passion, and supportive co-workers play a large role in encouraging women to pursue and stick with careers in cybersecurity."