Video

What is Splunk Attack Analyzer?

Episode 3

Video

Click the image to sign up to receive access to our video guide explaining 'What is Splunk Attack Analyzer?'.

Video Summary

Splunk Attack Analyzer applies multiple analysis engines to assess suspicious files and resources. While initial static file scans and antivirus checks may show no clear threats, the tool automatically downloads encrypted files and uses activation codes to decrypt and examine their contents without requiring human input. This seamless coordination between engines accelerates the investigation process.

Detection of Embedded Elements and Phishing Indicators

Attack Analyzer is capable of extracting embedded components like QR codes, which attackers often use in phishing campaigns. The tool can identify these elements and match them to known entities - for example recognising a QR code linked to Microsoft with high confidence. This contextual information contributes to the overall threat scoring.

Identifying Malicious Web Pages and Credential Harvesting

Suspicious web pages, such as fake Microsoft Office 365 login portals designed for credential harvesting, are flagged with maximum threat scores. Even less overtly suspicious pages are logged with contextual details, providing analysts with valuable insights for further investigation.

Continued Investigation of Linked Resources

When additional resources are found, such as password-protected zipped files, Attack Analyzer retrieves passwords automatically and continues with static and sandbox analysis. The system supports integration with various sandbox environments, including Windows and Linux, allowing flexible and thorough examination.

Behavioural Analysis Through Sandboxing

Sandbox execution captures screenshots and monitors behaviour, helping identify threats like Trojans attempting to hide their presence and capture keystrokes. This dynamic analysis provides deeper understanding of malware intent beyond static detection.

Aggregation of Metadata and Network Data

Attack Analyzer collects extensive metadata, network traffic data, and configuration details where available. It smartly ignores verified safe resources, focusing investigative effort on potentially harmful content to optimise efficiency.

Scoring and Prioritisation of Threats

Detection scores from individual resources and analysis engines are aggregated. The highest score determines the overall verdict, ensuring that the most dangerous threats receive priority in the response workflow.

Interactive Options for Human Verification

Although highly automated, Attack Analyzer provides interactive modes for analysts to manually address challenges such as CAPTCHAs that require human input, ensuring investigations can process when automation reaches its limits.

Conclusion

By combining static, dynamics and contextual analysis within a coordinated multi-engine framework, Splunk Attack Analyzer enables organisations to rapidly detect and investigate phishing and malware threats. This automation reduces analyst workload and enhances security posture through efficient and thorough threat detection.

Other Videos in this Series

Additional Resources

Who are Somerford?

We are a passionate group of people delivering innovation to our customers on their digital transformation journey.

Splunk Security Solutions

Utilise Splunk's suite of security solutions designed to provide uniefied and robust defence against cyber threads.

Splunk Attack Analyzer

Detect, Analyse, and Respond to Cyber Threats Faster with Automated Intelligence.

Get in Touch to Learn More

At Somerford, we are proud to be an Elite Splunk partner with specialist certified consultants in different areas of the Splunk suite. If you'd like to speak with one of our video presenters, or connect with one of our other experts, please get in touch with us today.
Scroll to Top