Skip to content

Commit 2600cb1

Browse files
authored
Merge branch 'develop' into MSIX-Resurrection
2 parents 7648000 + 9837cae commit 2600cb1

6 files changed

+21
-13
lines changed

detections/endpoint/linux_auditd_install_kernel_module_using_modprobe_utility.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Install Kernel Module Using Modprobe Utility
22
id: 95165985-ace5-4d42-9c42-93a89a5af901
3-
version: 6
4-
date: '2025-05-02'
3+
version: 7
4+
date: '2025-08-18'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -64,6 +64,7 @@ tags:
6464
- Linux Rootkit
6565
- Linux Persistence Techniques
6666
- Compromised Linux Host
67+
- China-Nexus Threat Activity
6768
asset_type: Endpoint
6869
mitre_attack_id:
6970
- T1547.006

detections/endpoint/linux_install_kernel_module_using_modprobe_utility.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Install Kernel Module Using Modprobe Utility
22
id: 387b278a-6326-11ec-aa2c-acde48001122
3-
version: 7
4-
date: '2025-05-02'
3+
version: 8
4+
date: '2025-08-18'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -65,6 +65,7 @@ tags:
6565
- Linux Privilege Escalation
6666
- Linux Persistence Techniques
6767
- Linux Rootkit
68+
- China-Nexus Threat Activity
6869
asset_type: Endpoint
6970
mitre_attack_id:
7071
- T1547.006

detections/network/internal_horizontal_port_scan.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Internal Horizontal Port Scan
22
id: 1ff9eb9a-7d72-4993-a55e-59a839e607f1
3-
version: 7
4-
date: '2025-05-22'
3+
version: 8
4+
date: '2025-08-18'
55
author: Dean Luxton
66
status: production
77
type: TTP
@@ -60,6 +60,7 @@ tags:
6060
analytic_story:
6161
- Network Discovery
6262
- Cisco Secure Firewall Threat Defense Analytics
63+
- China-Nexus Threat Activity
6364
asset_type: Endpoint
6465
mitre_attack_id:
6566
- T1046

detections/network/internal_horizontal_port_scan_nmap_top_20.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Internal Horizontal Port Scan NMAP Top 20
22
id: 3141a041-4f57-4277-9faa-9305ca1f8e5b
3-
version: 5
4-
date: '2025-05-22'
3+
version: 6
4+
date: '2025-08-18'
55
author: Dean Luxton
66
status: production
77
type: TTP
@@ -62,6 +62,7 @@ tags:
6262
analytic_story:
6363
- Network Discovery
6464
- Cisco Secure Firewall Threat Defense Analytics
65+
- China-Nexus Threat Activity
6566
asset_type: Endpoint
6667
mitre_attack_id:
6768
- T1046

detections/network/internal_vertical_port_scan.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Internal Vertical Port Scan
22
id: 40d2dc41-9bbf-421a-a34b-8611271a6770
3-
version: 6
4-
date: '2025-05-22'
3+
version: 7
4+
date: '2025-08-18'
55
author: Dean Luxton
66
status: production
77
type: TTP
@@ -60,6 +60,7 @@ tags:
6060
analytic_story:
6161
- Network Discovery
6262
- Cisco Secure Firewall Threat Defense Analytics
63+
- China-Nexus Threat Activity
6364
asset_type: Endpoint
6465
mitre_attack_id:
6566
- T1046

stories/china_nexus_threat_activity.yml

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,20 @@
11
name: China-Nexus Threat Activity
22
id: ac8b8e7c-ed27-428b-871f-ceb9400c733a
3-
version: 2
4-
date: '2025-02-24'
3+
version: 3
4+
date: '2025-08-18'
55
author: Teoderick Contreras, Splunk
66
status: production
7-
description: Leverage searches that allow you to detect and investigate unusual activities that might relate to Nexus, Chinese state-nexus adversaries known for its stealth and strategic targeting of high-value sectors. Monitor for indicators such as spear-phishing campaigns, exploitation of zero-day vulnerabilities, and unauthorized lateral movement within your network. Investigate anomalous data exfiltration, encrypted communications, and behaviors aligning with their known tactics, techniques, and procedures (TTPs). Combining threat intelligence with real-time monitoring helps identify and respond to Nexus APT activity, minimizing potential damage and data loss.
7+
description: Leverage searches that allow you to detect and investigate unusual activities that might relate to Nexus, Chinese state-nexus adversaries known for its stealth and strategic targeting of high-value sectors. Monitor for indicators such as spear-phishing campaigns, exploitation of zero-day vulnerabilities, and unauthorized lateral movement within your network. Investigate anomalous data exfiltration, encrypted communications, and behaviors aligning with their known tactics, techniques, and procedures (TTPs). Combining threat intelligence with real-time monitoring helps identify and respond to Nexus APT activity, minimizing potential damage and data loss. This includes TTPs for groups such as APT31, APT40, and more. Also covers UNC groups such as UNC3886.
88
narrative: As described by Crowdstrike, Chinese state-nexus threat group or adversary are known to target the telecommunications and technology sectors in multiple countries, including the US, to maintain sustained access as well as conduct espionage. Compromised entities in either sector represent potential supply chain vectors of concern to Splunk, although telecommunications entities are a more pervasive and acute concern in this regard. These actors are also known to broadly target unpatched routers, switches and other edge devices across various sectors. Given these threats, Splunk Threat Intelligence (TI) undertook a detailed investigation into China-nexus tactics and techniques that could be used in attempts to compromise Splunk. This report is the result of that investigation, detailing noteworthy behaviors and tools employed by China-nexus targeted intrusion actors.
99
references:
1010
- https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/
1111
- https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95?st=oe1KKi&reflink=desktopwebshare _permalink
1212
- https://www.judiciary.senate.gov/imo/media/doc/2024-11-19_pm_-_testimony_-_meyers.pdf
1313
- https://go.crowdstrike.com/rs/281-OBQ-266/images/GlobalThreatReport2024.pdf
1414
- https://www.crowdstrike.com/adversaries/envoy-panda/
15+
- https://www.trendmicro.com/en_us/research/25/g/revisiting-unc3886-tactics-to-defend-against-present-risk.html
16+
- https://cloud.google.com/blog/topics/threat-intelligence/apt40-examining-a-china-nexus-espionage-actor
17+
- https://cloud.google.com/blog/topics/threat-intelligence/uncovering-unc3886-espionage-operations
1518
tags:
1619
category:
1720
- Malware

0 commit comments

Comments
 (0)