heroui logo

Suspicious Email - UBA Anomaly

Splunk Security Content

View Source
Summary
The 'Suspicious Email - UBA Anomaly' detection rule is designed to identify potentially harmful emails based on sender characteristics, particularly focusing on unusual domains or behavioral anomalies using Splunk User Behavior Analytics (UBA). This rule utilizes a detection model called 'SuspiciousEmailDetectionModel' which analyzes email logs to find anomalies within user behavior. When the model flags an email, it often indicates an unfamiliar sender or a sender whose domain is rare, raising a potential security alert that necessitates further investigation. The search query leverages Splunk’s data model capabilities to extract data pertinent to UBA anomalies, specifically targeting suspicious email events described in the UBA's framework. It's noteworthy that the detection may generate false positives, especially when legitimate senders are using unfamiliar domains for the first time. In such instances, users are encouraged to validate these alerts by whitelisting true positives after investigation. The rule is deprecated, indicating that while useful in the past, it may not be the best practice moving forward.
Categories
  • Identity Management
  • Endpoint
Data Sources
  • User Account
  • Web Credential
ATT&CK Techniques
  • T1566
Created: 2024-11-14