Try in Splunk Security Cloud

Description

Leverage searches that allow you to detect and investigate unusual activities that might correlate to insider threat specially in terms of information sabotage.

  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud, Splunk Behavioral Analytics
  • Datamodel: Endpoint, Endpoint_Processes
  • Last Updated: 2021-11-17
  • Author: Teoderick Contreras, Splunk
  • ID: b71ba595-ef80-4e39-8b66-887578a7a71b

Narrative

Information sabotage is the type of crime many people associate with insider threat. Where the current or former employees, contractors, or business partners intentionally exceeded or misused an authorized level of access to networks, systems, or data with the intention of harming a specific individual, the organization, or the organization’s data, systems, and/or daily business operations.

Detections

Name Technique Type
High Frequency Copy Of Files In Network Share Transfer Data to Cloud Account Anomaly
Sdelete Application Execution Data Destruction, File Deletion, Indicator Removal on Host Anomaly

Reference

source | version: 1