APAC Splunk Attack Analyzer Webinar
APAC Splunk Attack Analyzer Webinar
Splunk Attack
Analyzer
Automatically analyze the
most complex credential
phishing and malware threats
Ray Huang
APAC Senior Security Solution Architect
Velocity of credential
phishing and Limited visibility and Lack of analyst
malware context bandwidth
Splunk Attack
Analyzer
Automated Threat Analysis of
Malware and Credential
Phishing Threats
© 2024 SPLUNK INC.
● Thoroughly conduct an
investigation and remain
confident the analyst and
enterprises’ identity is concealed
● Reputation ● Reputation
● Antivirus ● Antivirus
‒ Email Analyzer
‒ Web Analyzer
‒ Static Document Analysis
‒ Static File Analysis
‒ Archive Extractor
Processes run: Detected single page Static document analysis Fake Docusign Lure
● acrobat.exe PDF with URL detected a likely docusign lure
Phishing SWG/Proxy
EDR Alerts
Alerts Alerts
● Malware Detonation
Low Scoring Artifacts
● Credential Phishing Detection Filter out as false positives
Eliminate SOC effort
URL
SOAR
% %
66 90 Dramatically improved
and accelerated threat
investigation and
Significantly reduced effort to
construct and maintain
sophisticated threat analysis
reduction in reduction in false analysis playbooks
investigation time positives
Accelerated by Splunk AI
© 2024 SPLUNK INC.
with the leading TDIR solution
A Quick Demo
Qualification &
Objection
Handling
© 2024 SPLUNK INC.
© 2023 SPLUNK INC.
● No Linux or Mac Sandbox - How many Linux or Mac investigations per day? SAA
Static File Analysis is cross platform (Mac, Linux, Windows, Android)
● Already have a Sandbox - SAA has a sandbox but also does URL/File Analysis, Web
Analysis, Doc Analysis, AV, and Archive Extraction
● We have Proofpoint/Mimecast for Phishing - SAA does not replace your SEG, it sits
behind it and focuses on the emails that reach the users inbox.
● We have tools that do all this - Automated Investigation and Time Savings
● No Budget or Need for SAA - 91% of breaches in 2023 started with a phishing email
compromise - Deloitte
● Our Manual Process is fine - SAA’s automated investigations complete in an average
of 1-3 minutes. Manual Analysis can take 15-30+ minutes.
● We have Crowdstrike/Recorded Future Sandboxes - How many submissions per
day/week is the license for? Often not enough to cover all submissions
● We have VirusTotal and Threat Intel - Most advanced adversaries switch URLs and IPs
often. Most don’t appear on TI or VT
Assessing the
Demo
Environment
© 2024 SPLUNK INC.
Technical Badges
Splunk Attack Analyzer Technical Selling - Foundational
Questions?
Thank You
False Negatives
Threat
SEG / ICES
Detection
Email Need analysis to determine
verdict and full scope of
Vigilant impact Submit to
False Positives
Employees
Splunk
EDR / AV
Need analysis before Attack
File
Retroactive
Alerts
releasing from quarantine Analyzer
True Threats
% %
66 90+ Dramatically improved
and accelerated threat
investigation and analysis
reduction in reduction in false
investigation time positives
Static Doc
Email with Sandbox Fake DocuSign No Exploits… Email with Fake DocuSign Warning: Lure
PDF Attachment PDF Attachment
L
UR
ct
je
In
Web Analyzer
R L
it U
b m RL
Su kU
Splunk Clic Lure Page
Sandbox Lure Page No Exploits… Attack Warning: Lure
Sub
mit Analyzer
URL
Do
wn
loa
Su
Static Doc
Sandbox
Sandbox Malicious File Malicious File Malicious File Malicious File
Detected Detected
Static Doc
Email with Sandbox Fake DocuSign No Exploits… Email with Fake DocuSign Warning: Lure
PDF Attachment PDF Attachment
L
UR
ct
je
In
Web Analyzer
R L
it U
b m RL
Su kU
Splunk Clic Lure Page
Sandbox Lure Page No Exploits… Attack Warning: Lure
Sub
mit Analyzer
URL
Do
wn
loa
Su
Static Doc
Sandbox
Sandbox Malicious File Malicious File Malicious File Malicious File
Detected Detected
Case Case
Management Management
● Static & Dynamic Analysis
Reporting
Orchestration
● Attack Chain Following Reporting
Orchestration
and Metrics
● Rich Forensics and Metrics
Event Event
Management
Splunk Attack Management
Analyzer
Splunk SOAR excels in case Splunk Attack Analyzer conducts Once Splunk Attack Analyzer has
management, initial enrichment, automated analysis of identified confirmed an active threat, Splunk
and orchestration to identify events indicators without SOC analysts having SOAR executes the appropriate
from the SIEM and user-reported to perform manual investigative tasks. response playbook to protect the
phishing, and open cases. enterprise.