Enhancing Enterprise Security for Ransomware
Ransomware isn't going away
Ransomware is a profitable business model for cyber criminals with 2016 payments closing at the billion dollar mark. According to a recent survey by IBM, nearly 70% of executives hit by ransomware have paid to get their data back. Those survey results do not include smaller organizations and consumers who are also paying to get their data back.
With the threat from ransomware growing, aside from prevention, detection is key to removing compromised devices from the network. Unfortunately, signature-based detection alone will not catch everything. Instead, using it in combination with hunting techniques in Splunk can enhance your security posture.
In this blog, we'll walkthrough adding the free ransomware intelligence feed from abuse.ch to Splunk Enterprise Security.
Requirements
- Internet Access for the Splunk Enterprise Security Instance
- Splunk Enterprise Security
- Knowledge of updating Splunk configurations
Configuration
There are two paths forward, which will depend on the level of access you have to the enterprise security search head.
Command Line Method (Recommended)
Create or update the configuration file in the SA-ThreatIntelligence app's local directory:
$ vi /opt/splunk/etc/apps/SA-ThreatIntelligence/local/inputs.conf
Add the following configuration:
[threatlist://ransomware_ip_blocklist]
delim_regex = :
description = abuse.ch Ransomware Blocklist
disabled = false
fields = ip:$1,description:Ransomware_ip_blocklist
type = threatlist
url = https://ransomwaretracker.abuse.ch/downloads/RW_IPBL.txt
Restart the Splunk service:
$ /opt/splunk/bin/splunk restart
GUI Method
-
Locate the Enterprise Security Configuration Page
-
Select Threat Intelligence Downloads

-
Click New and fill in the configuration:

Verification
Once configured, Enterprise Security will download the threat intelligence and begin alerting on any events found which match the threatlist. These can be reviewed and triaged as part of your workflow in the notable events page.

Note: If you're not seeing the threat intelligence feed, refer to the troubleshooting guide in the Splunk documentation.
Additional Resources
For more examples, see the official documentation: Add a ransomware threat feed to Splunk Enterprise Security