Unknown and unseen, the cyberwar between Crimsonia and Berylia

Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.

This is a fictional scenario.

First week of December, unbeknown to many the island of Berylia engaged in cyberwarfare with their neighbors Crimsonia after a number of months of heightened tensions. The goal of the Berylian attackers was to disable as many critical infrastructure components of the Crimsonian Ministry of Defense in order to prevent the Crimsonian Navy from sailing. This would give the Berylian fleet the time to aid and protect critical locations and assets.

Four offensive cyber operations were carried out:

Operation Hidden Ghost, to stop the Crimsonian Ministry of Defence (MOD) from performing effectively by infiltrating their IT systems.

Operation Golden Predator, to stop the Crimsonian Office of the President (COP) from performing effectively by infiltrating their IT systems.

Operation Iron Oak, The goal of Operation Iron Oak is to stop the Crimsonian News Service (CNS) from performing effectively by infiltrating their IT systems.

Operation Urban Sun, to stop the Crimsonian Foreign Ministry (CFM) from performing effectively by infiltrating their IT systems.

The attacks would lead attackers to gain foothold, exfil and report any intelligence, place misinformation and destroy enemy systems when given the command.

-- end of fictional scenario

This was the fictional scenario for the technical red-teaming exercise by NATO affiliated CCDCOE Crossed Swords 2022 event in Tallinn, Estonia. The popular cyber security event attracts talent from many countries across the world. This impressive scenario contains multiple virtual organizations as targets and hundreds of realistic systems and virtual users as targets.

It allows participants to experiment with some of the best technologies available in order to simulate offensive cyberspace operations in a modern battlefield with the goal of testing product security and improving cyber resilience through proactive monitoring and detection.

“CCDCOE continues to provide a unique full-spectrum training session in the areas of cyber red-teaming, penetration testing, digital forensics, and situational awareness.” - Carry Kangur, CCDCOE Head of Cyber Exercises

Splunks role was to assist the Yellow Team in providing detailed, timely feedback on the offensive operations through the use of Splunk Enterprise and Enterprise Security. This crucial task helped the other teams understand the footprint left on the network and infrastructure when suspicious activity occurs. Splunkers Kendrick Tugwell - Principal Architect, Floris Ladan - Security Strategist attended the event in Tallinn, Estonia.

Enterprise Security was set up with multiple out-of-the-box detections enabled, with the addition of the latest content packs installed. This coupled with some custom searches and dashboards specifically targeted at the operation created by members of the Yellow Team.

This image shows Enterprise Security’s Posture Dashboard which highlights the scale of the attack.

At the end of every day, the Yellow Team used Splunk along with other tools to produce a report for the attackers and defenders. This report included links to Splunk dashboards, screenshots, and recommendations of how to better avoid detection.

The image below shows a custom dashboard that utilizes Splunk Machine Learning Toolkit to detect outliers in Windows Process Execution. In some instances this dashboard managed to detect attacks on hosts before they were fully compromised.

At the end of a successful event, the red team were able to compromise many of the hosts within the various Crimsonia networks. Splunk was there, mapping them all and providing insights into the vast amount of data generated throughout this attack.

This image shows the attack link analysis where attackers penetrated multiple hosts.

The details, commitment, effort and resources utilized in this exercise have been exceptional, CCDCOE has been able to get and commit the best people to implement this exercise in order to train and spread awareness of the importance of cybersecurity and cyberwarfare in the future.

If you’re interested in improving your businesses cyber resilience and want a deeper dive into the tools used here, please contact your Splunk representative.

Crossed Swords runs yearly, if you would like to participate, please contact our friends at CCDCOE.

Kendrick & Floris

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.