<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I use Splunk to determine Phishing attempts? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9520#M155</link>
    <description>&lt;P&gt;One method we've been using is looking for multiple failed logins from a single IP.  &lt;/P&gt;

&lt;BLOCKQUOTE&gt;
  &lt;P&gt;sourcetype="some source where login
  attempts are logged" ipaddress!=10.*
  NOT Succeeded| stats
  distinct_count(loginname) AS
  logincount by ipaddress | where
  logincount &amp;gt; 10&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;IE: For all ips not in our local subnet and without a "Succeeded" message in our application access log, provide stats on each login grouped by ipaddress, and only show me the results where 10 or more accounts had unsuccessful access attempted to.&lt;/P&gt;

&lt;P&gt;Another method:&lt;/P&gt;

&lt;P&gt;If you know the site that is phishing user data, you can also use Splunk to create a honeypot.  To do this setup a saved search &amp;amp; alert on some sort of input value known only to you, and then use that value on the site.  If the value you provided is attempted, you'll get an alert (hopefully with the data necessary to mitigate further).  This is helpful as often the site phishing the data is not the IP that is attempting to re-use and exploit the data.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2010 08:03:11 GMT</pubDate>
    <dc:creator>Yancy</dc:creator>
    <dc:date>2010-01-29T08:03:11Z</dc:date>
    <item>
      <title>How can I use Splunk to determine Phishing attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9519#M154</link>
      <description>&lt;P&gt;What are some methods of determining anomalous login behavior with Splunk?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2010 07:58:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9519#M154</guid>
      <dc:creator>Yancy</dc:creator>
      <dc:date>2010-01-29T07:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: How can I use Splunk to determine Phishing attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9520#M155</link>
      <description>&lt;P&gt;One method we've been using is looking for multiple failed logins from a single IP.  &lt;/P&gt;

&lt;BLOCKQUOTE&gt;
  &lt;P&gt;sourcetype="some source where login
  attempts are logged" ipaddress!=10.*
  NOT Succeeded| stats
  distinct_count(loginname) AS
  logincount by ipaddress | where
  logincount &amp;gt; 10&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;IE: For all ips not in our local subnet and without a "Succeeded" message in our application access log, provide stats on each login grouped by ipaddress, and only show me the results where 10 or more accounts had unsuccessful access attempted to.&lt;/P&gt;

&lt;P&gt;Another method:&lt;/P&gt;

&lt;P&gt;If you know the site that is phishing user data, you can also use Splunk to create a honeypot.  To do this setup a saved search &amp;amp; alert on some sort of input value known only to you, and then use that value on the site.  If the value you provided is attempted, you'll get an alert (hopefully with the data necessary to mitigate further).  This is helpful as often the site phishing the data is not the IP that is attempting to re-use and exploit the data.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2010 08:03:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9520#M155</guid>
      <dc:creator>Yancy</dc:creator>
      <dc:date>2010-01-29T08:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: How can I use Splunk to determine Phishing attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9521#M156</link>
      <description>&lt;P&gt;i &lt;span class="lia-unicode-emoji" title=":red_heart:"&gt;❤️&lt;/span&gt; your icon!!!&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2010 02:38:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9521#M156</guid>
      <dc:creator>piebob</dc:creator>
      <dc:date>2010-02-04T02:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: How can I use Splunk to determine Phishing attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9522#M157</link>
      <description>&lt;P&gt;Consider accepting your answer &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Apr 2010 00:14:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-can-I-use-Splunk-to-determine-Phishing-attempts/m-p/9522#M157</guid>
      <dc:creator>jrodman</dc:creator>
      <dc:date>2010-04-22T00:14:47Z</dc:date>
    </item>
  </channel>
</rss>

