Analytics Story: Suspicious Ollama Activities

Description

Leverage advanced Splunk searches to detect and investigate suspicious activities targeting Ollama local LLM frameworki, including prompt injection attacks, information extraction attempts, compliance violations, and anomalous user behaviors.

Why it matters

Modern adversaries targeting Ollama deployments employ increasingly sophisticated techniques that mirror traditional malware campaigns. Our detection framework identifies multi-stage attacks where threat actors use obfuscated prompts, layered social engineering, and persistent manipulation techniques to compromise local model security controls. These attacks often involve initial reconnaissance through seemingly benign API requests, followed by escalated attempts to extract model weights, manipulate Modelfile configurations, or establish persistent behavioral modifications through custom model injection.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Ollama Abnormal Network Connectivity Non-Standard Port Anomaly
Ollama Abnormal Service Crash Availability Attack Service Stop Anomaly
Ollama Excessive API Requests Network Denial of Service Anomaly
Ollama Possible API Endpoint Scan Reconnaissance Active Scanning Anomaly
Ollama Possible Memory Exhaustion Resource Abuse Endpoint Denial of Service Anomaly
Ollama Possible Model Exfiltration Data Leakage Exfiltration Over Alternative Protocol Anomaly
Ollama Possible RCE via Model Loading Exploit Public-Facing Application Anomaly
Ollama Suspicious Prompt Injection Jailbreak Exploit Public-Facing Application, Command and Scripting Interpreter Anomaly

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
Ollama Server N/A ollama:server server.log

References


Source: GitHub | Version: 1