Skip to content

Commit 0fbf9b9

Browse files
authored
Merge pull request #3696 from splunk/asa_story
Suspicious Cisco Adaptive Security Appliance Activity - story file
2 parents 8e63105 + a1d2b73 commit 0fbf9b9

File tree

2 files changed

+38
-13
lines changed

2 files changed

+38
-13
lines changed

detections/application/cisco_asa___logging_disabled_via_cli.yml

Lines changed: 4 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,8 @@ known_false_positives: |
3232
troubleshooting, or device reconfiguration. These events should be verified
3333
against approved change management activities.
3434
references:
35-
- https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
36-
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
37-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB
38-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
39-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW
40-
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
41-
- https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
42-
- https://www.ncsc.gov.uk/news/persistent-malicious-targeting-cisco-devices
35+
- https://www.cisco.com/site/us/en/products/security/firewalls/adaptive-security-appliance-asa-software/index.html
36+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
4337
drilldown_searches:
4438
- name: View the detection results for $host$
4539
search: '%original_detection_search% | search host = $host$'
@@ -60,17 +54,14 @@ rba:
6054
type: ip_address
6155
tags:
6256
analytic_story:
63-
- ArcaneDoor
57+
- Suspicious Cisco Adaptive Security Appliance Activity
6458
asset_type: Network
6559
mitre_attack_id:
66-
- T1562.002
60+
- T1562
6761
product:
6862
- Splunk Enterprise
6963
- Splunk Enterprise Security
7064
security_domain: network
71-
cve:
72-
- CVE-2025-20333
73-
- CVE-2025-20362
7465
tests:
7566
- name: True Positive Test
7667
attack_data:
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: Suspicious Cisco Adaptive Security Appliance Activity
2+
id: 5d9e31a4-64df-4f13-b9da-6b2dc40e0c1e
3+
version: 1
4+
date: '2025-09-26'
5+
author: Bhavin Patel, Splunk
6+
status: production
7+
description: |
8+
This analytic story provides a suite of detections built to analyze telemetry and syslog
9+
generated by Cisco Adaptive Security Appliance (ASA) devices.
10+
It focuses on identifying suspicious and potentially malicious activity such as logging
11+
suppression, unauthorized configuration changes, anomalous connection patterns, unexpected
12+
drops in core syslog message volume, and potential command-and-control (C2) behaviors.
13+
These detections help defenders surface behavior on security edge devices that may indicate
14+
defense evasion, exploitation attempts, or device tampering.
15+
narrative: |
16+
Cisco ASA/FTD appliances are commonly deployed at network boundaries to enforce security
17+
policies, inspect traffic, and provide remote access. As critical control-plane devices,
18+
their logs and operational telemetry can reveal adversary behavior ranging from configuration
19+
tampering and logging suppression to exploitation and C2.
20+
21+
Monitoring activity from Cisco ASA and FTD devices is critical because these appliances serve as key security controls at the network perimeter. Analyzing their telemetry and syslog data helps organizations maintain visibility into device health, policy enforcement, and potential threats. Regular monitoring enables early detection of unusual or unauthorized activity, supports compliance requirements, and strengthens the overall security posture by ensuring that any deviations from expected behavior are promptly investigated.
22+
references:
23+
- https://www.cisco.com/site/us/en/products/security/firewalls/adaptive-security-appliance-asa-software/index.html
24+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
25+
tags:
26+
category:
27+
- Adversary Tactics
28+
product:
29+
- Splunk Enterprise
30+
- Splunk Enterprise Security
31+
- Splunk Cloud
32+
usecase: Advanced Threat Detection
33+
34+

0 commit comments

Comments
 (0)