Skip to content

Releases: splunk/security_content

v5.8.0

18 Jun 20:23
1a176b3
Compare
Choose a tag to compare

Key Highlights

  • πŸ₯ΈRemote Employment Fraud Detections
    Remote Employment Fraud involves threat actors posing as job seekers or employers in order to gain unauthorized access to systems or employment through deceptive means. In many cases, it involves the use of fraudulent or stolen identity documents which are used to hide the true identity and/or location of an employee. This release includes a number of analytics that can help detect the digital footprint of employment fraud through the analysis of unexpected Network behaviors (such as VPN usage or anomalously high latency) or the presence of nonstandard audio or video devices.
  • πŸ“¦Inno Setup Abuse
    Inno Setup is a widely used, legitimate packaging tool for the installation of software in Windows environments. Recently, it has seen increasingly common usage by malicious actors, hiding embedded malware payloads in otherwise benevolent software installers. These payloads, which are often encrypted or obfuscated, are then executed by a number of different means such as scripting or process injection. This story demonstrates a number of different techniques observed by malware abusing Inno Setup to gain execution and persistence.
  • πŸ•ΈοΈWeb Browser Abuse
    Locally installed malware may use Web Browsers to aid in the execution of malicious code, perform command and control, or transfer files. To decrease their footprint or provide flexibility in how they operate, this malware may supply a number of nonstandard command line flags when launching browsers. This release supplies a number of analytics which recognize these suspicious flags.

New Analytic Story - [2]

New Analytics - [4]

Updated Analytics - [63]

Other Updates

  • Added Macro - β€œzoom_index”
  • Updated Macro β€œgsuite_drive”
  • As previously communicated in the ESCU v5.6.0 release, several detections have been removed. For a complete list of the detections removed in version v5.8.0, refer to the List of Removed Detections in v5.8.0. Users are expected to transition to the recommended replacements where applicable. Additionally, a new set of detections has been deprecated. For details on detections scheduled for removal in ESCU version v5.10.0, see the List of Detections Scheduled for Removal in ESCU v5.10.0.

v5.7.0

04 Jun 19:52
1b81186
Compare
Choose a tag to compare

Key highlights

ESCU 5.7.0 brings tighter integration with Cisco Security Products and a number of fixes and improvements to existing content:

πŸ›‘οΈ Cisco Secure Firewall Threat Defense Integration
Improved and tested several ESCU detections to work with Event Streamer (eStreamer) data collected by the Cisco Secure Firewall Threat Defense (FTD) platform. For more information about Cisco Secure Firewall, go to the Cisco Secure Firewall site or refer to the Cisco Secure Firewall Threat Defense Analytics analytic story.

πŸ› Bugfixes based on community feedback
Feedback from community members and users continues to be one of the best paths to improve the quality and performance of ESCU content. This release includes a number of bug fixes that reduces false positives and improves the risk entities and fields returned from searches.

New Analytics - [1]

Updated Analytics - [12]

Other Updates

  • Added lookup cisco_secure_firewall_appid_remote_mgmt_and_desktop_tools
  • Updated lookups cisco_secure_firewall_filetype_lookup and cisco_snort_ids_to_threat_mapping
  • No detections have been removed in the ESCU v5.7.0 release. As previously communicated in the ESCU v5.6.0 release, several detections will be removed in ESCU v5.8.0. For details on detections scheduled for removal in ESCU version v5.8.0, see the List of Detections Scheduled for Removal in ESCU v5.8.0

v5.6.0

21 May 19:17
d76aa41
Compare
Choose a tag to compare

Key highlights

πŸ›‘οΈ Cisco Secure Firewall Intrusion Analytics
We developed six new analytic rules using Intrusion logs to detect high-priority intrusion events, group alerts by threat activity, identify Lumma Stealer behaviors (download and outbound attempts), and monitor Veeam CVE-2023-27532 exploitation by combining the presence of specific Snort IDs triggered in a short period of time.

πŸ“Š Threat Activity by Snort IDs Dashboard
A new dashboard leveraging Cisco Firewall logs from eStreamer and a curated lookup to correlate Snort intrusion identifiers with specific threat actors, visualize device-wide activity and file trends, and explore the overall risk profile of the host with events from Splunk Enterprise Security.

πŸ“ New Analytic Story & Threat Mappings
We published a new analytic story on Fake CAPTCHA campaignsβ€”mapping existing detections to observed TTPs and introducing a Windows PowerShell FakeCAPTCHA Clipboard Execution detectionβ€”and completed comprehensive Xworm RAT threat mapping to ensure broad detection coverage.

New Analytic Story - [2]

New Analytics - [8]

Other Updates

  • Added two new lookups cisco_snort_ids_to_threat_mapping and threat_snort_count that contain information about snort Ids that are mapped to specific threat actors

  • Updated several detections based on customer feedback and bug reports on Github issues.

  • As previously communicated in the ESCU v5.4.0 release, several detections have been removed. For a complete list of the detections removed in version v5.6.0, refer to the List of Removed Detections in v5.6.0. Users are expected to transition to the recommended replacements where applicable. Additionally, a new set of detections has been deprecated. For details on detections scheduled for removal in ESCU version v5.8.0, see the List of Detections Scheduled for Removal in ESCU v5.8.0

v5.5.0

08 May 17:38
c01f075
Compare
Choose a tag to compare

✨ Highlights

  • πŸ›‘οΈ SAP NetWeaver Exploitation
    Released a new analytic story targeting CVE-2025-31324 in SAP NetWeaver, including a dedicated hunting detection for β€œSAP NetWeaver Visual Composer Exploitation Attempt” to catch early signs of exploitation. You can read more about this vulnerability here.

  • 🍏 AMOS Stealer Analytics
    Added a new analytic story for AMOS Stealer and introduced the β€œmacOS AMOS Stealer – Virtual Machine Check Activity” detection, which looks for the execution of the osascript command along with specific command-line strings.

  • πŸͺŸ Additional Windows Detections
    We shipped three new Windows-focused detections to improve visibility into post-compromise activity: one that identifies reconnaissance by monitoring built-in log query utilities against the Windows Event Log, another that alerts when an adversary clears the Event Log via Wevtutil, and a third that detects malicious file downloads executed through the CertUtil utility.

New Analytic Story - [2]

New Analytics - [5]

Other Updates

  • Updated theis_nirsoft_software lookup with additional nirsoft tooling
  • Updated attack_data links for several detections.

v5.4.0

23 Apr 22:01
de5542c
Compare
Choose a tag to compare

✨ Highlights

  • πŸ”₯ Cisco Secure Firewall Threat Defense Analytics: We published a new analytic story and added new detections for Cisco Secure Firewall focusing on three primary event typesβ€”file events, network connections, and intrusion alerts. These detections identify activity such as malicious or uncommon file downloads, connections over suspicious ports or to file-sharing domains, and Snort rule-based intrusion events across multiple hosts. This enables broader visibility into network-based threats and host-level indicators of compromise.

  • πŸ€– AWS Bedrock Security: Released a new analytic story to monitor for adversary techniques targeting AWS Bedrock, a managed service used to build and scale generative AI applications. This includes detections for the deletion of security guardrails, knowledge bases, and logging configurations, as well as high volumes of model invocation failures.

  • πŸ•΅οΈ Mapping Threat Campaigns: Several detections have been mapped to known threat actors and malware campaigns, including Cactus Ransomware, Earth Alux, Storm-2460 CLFS Zero Day Exploitation and Water Gamayun, to improve attribution to TTPs and provide insights into observed behaviors.

  • πŸ†• New Detections: Introduced additional detections for tactics such as directory path manipulation via MSC files, IP address collection using PowerShell Invoke-RestMethod, process spawning from CrushFTP, and deletion of Volume Shadow Copies via WMIC. These detections target adversary behavior related to discovery, lateral movement, and anti-forensics.


πŸ“š New Analytic Stories – [6]


🧠 New Analytics – [27]


πŸ›  Other Updates

  • πŸ”„ Reverted several searches to use | join instead of prestats = t due to bugs encountered in the search logic.
  • ❌ Removed Detections – As notified in the ESCU v5.2.0 release, we have removed these detections. Please use replacements where appropriate.
  • πŸ—“οΈ Deprecated more detections now scheduled for removal in ESCU v5.6.0.
  • πŸ“₯ Updated deprecation_info lookup to reflect the latest list of deprecated and removed detections.

v5.3.0

09 Apr 17:11
31deacc
Compare
Choose a tag to compare

Key Highlights

  • βš™οΈ Detection Output Standardization: Additionally, we’ve updated the majority of our detections to include a standardized set of output fields within each detection analytic and enhanced our tooling to consistently enforce this structureβ€”improving usability, correlation, and integration across security workflows.

  • 🚨 Apache Tomcat Session Deserialization Attacks: CVE-2025-24813 is an unauthenticated remote code execution vulnerability in Apache Tomcat’s partial PUT feature disclosed on March 10, 2025. We introduced a new analytic story targeting potential exploitation of Apache Tomcat servers. This story includes detections for suspicious session deserialization attempts and file uploadsβ€”techniques commonly used by attackers to gain remote access or execute arbitrary code.

  • πŸͺŸ Windows Shortcut Exploit Abuse: Released a new analytic story to detect emerging exploitation patterns involving Windows LNK files. This includes detections for abuse of SSH ProxyCommand, LNK files with abnormal padding, and Windows Explorer spawning suspicious processes like PowerShell or CMD. These analytics are designed to surface stealthy initial access and execution techniques leveraged in recent zero-day attacks. More details can be found here - (ZDI-CAN-25373)

  • πŸ’₯ New Ransomware Campaigns: We’ve expanded our ransomware mapping to include detection coverage for emerging threats such as Medusa Ransomware, Termite, Van Helsing, Salt Typhoon, and Sea Shell Blizzard. These mappings help contextualize detections within current threat actor TTPs and provide better visibility into campaign-specific behaviors.

  • πŸ”₯ Windows Firewall Rule Monitoring: We also introduced new detections to monitor firewall-related security events on Windows systems, including: Windows Firewall Rule Added, Windows Firewall Rule Deletion, and Windows Firewall Rule Modificationβ€”helping security teams track unauthorized or suspicious changes to host-based firewall configurations.

New Analytic Stories - [8]

New Analytics - [15]

Other Updates

  • Updated ransomware_extensions and remote_access_software lookup with new values. (Contributor @sventec)
  • Updated a majority of detections to output improved field names, which should enhance how they appear in Enterprise Security. We also added output_fields to the data source objects to enforce output validation for detection analytics
  • Fixed a minor bug that prevented the deprecated and removed content warning banner from displaying correctly on the landing page

v5.2.0

24 Mar 18:41
4583864
Compare
Choose a tag to compare

Key highlights

We released new analytic stories and detections to enhance monitoring and security across GitHub, O365, and SQL Server environments. Here’s a summary of the latest updates:

  • πŸ‘¨β€πŸ’» GitHub Malicious Activity: A new analytic story focused on detecting potential security risks and policy violations in GitHub Enterprise and GitHub Organizations. This includes detections for disabling 2FA requirements, modifying or pausing audit log event streams, deleting repositories, disabling security features like Dependabot and branch protection rules, and registering unauthorized self-hosted runnersβ€”helping organizations prevent unauthorized changes and account takeovers.

  • πŸ“§ O365 Email Threat Monitoring: Expanded coverage for malicious email activity in O365 environments. New detections focus on identifying inbox rule modifications, excessive email deletions, suspicious exfiltration behavior, and attempts to compromise payroll or password information. These detections help security teams track and mitigate email-based attacks, account takeovers, and data exfiltration tactics.

  • πŸ—’οΈ SQL Server Abuse: Introduced a new analytic story targeting SQL Server exploitation tactics. These detections cover malicious SQLCMD execution, abuse of xp_cmdshell, unauthorized configuration changes, and the loading of potentially dangerous extended procedures. This enhanced monitoring helps organizations detect lateral movement and privilege escalation attempts in Windows-based SQL environments.

  • πŸ” We have also mapped several of our existing detections to the Black Basta Ransomware, SnappyBee and SystemBC malware families as they continue to make headlines targeting various organizations.

  • πŸŽ—οΈ As announced in ESCU v5.0.0 release, we are removing old and dated content from the app starting with ESCU v5.2.0, which includes several removal of detections in this release to improve quality of detections. Along with the deprecation assistant that is shipped in the application, you can also refer to this list of removed detections and replacements on Splunk docs.

New Analytic Story - [6]

New Analytics - [43]

Macros Added - [5]

  • github_enterprise
  • github_organizations
  • o365_messagetrace
  • o365_suspect_search_terms_regex
  • process_sqlcmd

Macros Updated - [1]

  • linux_auditd

Lookups Added - [2]

  • deprecation_info
  • windows_suspicious_tasks

Lookups Updated - [1]

  • ransomware_notes_lookup

Removed detections from v5.2.0

  • The list of removed detections and its potential replacements(where available)

Marked for Deprecation in v5.4.0

Read more

v5.1.1

04 Mar 18:21
3dbc72f
Compare
Choose a tag to compare

Release notes -v5.1.1 (Patch build)

  • Minor text update to malicious_powershell_strings.csv lookup file that caused MS Defender to falsely flag ESCU v5.1.0 as a malware.

v5.1.0

24 Feb 20:19
c795cda
Compare
Choose a tag to compare

Release notes - v5.1.0

Key highlights

We released 4 new analytic stories and added 41 new detection analytics. Some high level details of the new analytic stories in this release

  • πŸ“‘ Remote Monitoring and Management Software: Added a new story file to help users analyze unauthorized remote monitoring & management (RMM) tool usage, including detection of 3rd-party software installations like AnyDesk and TeamViewer through phishing/drive-by compromises.

  • ☁️ AWS S3 Bucket Security Monitoring: A new analytic story which addresses the risks associated with S3 bucket misconfigurations and potential hijacking of decommissioned buckets. This story includes baselines and detections that track public S3 buckets before deletion, monitor access attempts to these bucket names, and identify potential hijacking activities, leveraging AWS CloudTrail logs, DNS queries, and web proxy data to ensure robust monitoring and security.

  • πŸ›‘οΈ Security Solution Tampering: A new analytic story, which includes new detections focused on identifying tampering activities with Cisco Secure Endpoint services. These detections cover techniques such as inhibiting system recovery and disabling or modifying security tools, enhancing our ability to detect and respond to potential security threats.

  • πŸ“‹ Windows Audit Policy Tampering: We also added detections for Windows audit policies, which are crucial for logging key system activities for monitoring and forensic analysis. This analytic story provides a framework to detect suspicious activities involving audit policy manipulation, such as the use of auditpol.exe with specific flags, helping to uncover potential malicious activity and maintain the integrity of security monitoring mechanisms.

  • In addition, external contributor @nterl0k has significantly enhanced our detection capabilities with six new Office 365 security detections and several other detections.. These include monitoring changes to email transport rules, various methods of data exfiltration, and suspicious authentication and search behaviors, providing robust protection against potential threats.

New Analytic Story - [4]

New Analytics - [41]

(Big thank you to @nterl0k from our Github Community for contributing several amazing tested detections, stories, lookups for this release! )

Macros Added - [4]

  • important_audit_policy_subcategory_guids
  • normalized_service_binary_field
  • process_auditpol
  • windows_exchange_iis

Macros Updated - [11]

  • ms_defender
  • powershell
  • printservice
  • remoteconnectionmanager
  • sysmon
  • wineventlog_application
  • wineventlog_rdp
  • wineventlog_security
  • wineventlog_system
  • wineventlog_task_scheduler
  • wmi

Lookups Added - [2]

  • malicious_powershell_strings
  • windows_suspicious_services

Lookups Updated - [5]

  • asr_rules
  • builtin_groups_lookup
  • dynamic_dns_providers_default
  • remote_access_software
  • security_services_lookup

Other updates

  • New baselines: Baseline Of Open S3 Bucket Decommissioning
  • Added a dropdown for dashboards to the navigation bar

v5.0.0

31 Jan 18:57
7712cd9
Compare
Choose a tag to compare

🌟 Github Community

πŸŽ‰ The Splunk Threat Research Team is thrilled to announce Enterprise Security Content Update (ESCU) v5.0.0!

Key Highlights

  • (NEW) 🚨 Deprecation Assistant Dashboard: This release introduces a deprecation assistant dashboard for ESCU users to identify and manage deprecated detection analytics currently enabled in their Splunk Environment. These detections will be removed in ESCU v5.2.0 and could disrupt environments using them. For more in-depth information about which pieces of content will be removed and their replacements, please refer to the docs - πŸ“„ Documentation.

  • (NEW) πŸ› οΈ Analytic Story Onboarding Assistant: In this release, we've introduced a redesigned home page with an enhanced UI that offers direct access to release notes, analytics counts, and the latest version on Splunkbase, complemented by a detailed timeline of STRT blogs and updates. Additionally, we've launched the Analytic Story Onboarding Assistant, a new preview feature designed to streamline the process of enabling several detections from multiple analytics stories for which there is data available in your Splunk Environment.

  • πŸ” New Analytics: We have expanded our threat detection capabilities by mapping existing analytics and developing new detections for a range of threats, including Backdoor Pingpong, Cleo File Transfer Software, Crypto Stealer, SDDL Tampering Defense Evasion, Derusbi, Earth Estries, Nexus APT Threat Activity, WinDealer RAT, and XorDDos.

New Analytic Story - [9]

New Analytics - [52]

Other Updates

  • We've updated our YAML configurations by enhancing validation, improving accuracy and consistency, and replacing the 'observables' key with an 'RBA' key to better align with Enterprise Security standards and simplify risk attribution.