The BreachAlert App for Splunk brings open, deep and DarkWeb data breach alert details into Splunk to help you improve incident response.
Connection to the BreachAlert API enables the creation of Alerts on various types of data - emails, domains, IP addresses, card details, addresses etc. which are organized in folders. When confidential data matching these Alerts is leaked, marketed or sold on the Dark Web, Internet Relay Chat and bin sites, a result is posted via the API. The BreachAlert application regularly polls the API to pull in details of the breached data detected by BreachAlert
The Splunk integration is available to customers using BreachAlert Enterprise. If you would like to upgrade your BreachAlert edition, please contact BreachResponse@skurio.com
Access to BreachAlert requires registration on the Skurio developer portal. Once registered, you can request access to the BreachAlert API. You will be provided with two keys: an API key for your BreachAlert account, and an App key that is specific to your Splunk connection. Both keys are needed to activate the Splunk integration
To install the BreachAlert App for Splunk:
The app will start to retrieve data as soon as it's configured
By default, BreachAlert data inputs bring in new results detected after the time they are configured. You can override this by going to the BreachAlert data input's settings and entering a date range in override_range. Once specified, clicking save will cause an immediate fetch of results from that range. Following that fetch, override_range is set back to None, and the input returns to pulling new data periodically.
The date range must be entered as "start end" with dates in yyyy-mm-dd format and single space between.
e.g. for Sept 1 to Sept 30:
Note that data is fetched up to, but not including the end date, so to fetch a full month of data, specify the first day of the next month as the end date.
The default tab for the app shows four panes:
This is just the regular search interface, allowing you to explore the BreachAlert data
BreachAlert defines a data model that can be useful for providing data to other components. This can be viewed here. If you need to edit this, we recommend you duplicate it and make changes in the copy
Add BreachAlert-specific alerts here
Define BreachAlert-specific dashboards here
The BreachAlert App is compatible with CIM 4.x.
breachalert_match is tagged with
incident to make it compatible with the
Data Loss Prevention - DLP Incidents dataset using the following provided mapping:
|Field||BreachAlert Field||BreachAlert description||Data model description|
|action||"GenerateIncidentReport"||Constant value||The action taken by the DLP device.|
|app||"BreachAlert"||Constant value||The application involved in the event.|
|category||matchType||The type of data matched:
||The category of the DLP event.|
|dest||-||-||The target of the DLP event.|
|dest_bunit||-||Automatically assigned by Splunk||The business unit of the DLP target.|
|dest_category||-||Automatically assigned by Splunk||The category of the DLP target.|
|dest_priority||-||Automatically assigned by Splunk||The priority of the DLP target.|
|dest_zone||-||-||The zone of the DLP target.|
|dlp_type||"breach-detection"||Constant value||The type of DLP system that generated the event.|
|dvc||folderName + "/" + alertName||The folder and name of the alert that triggered the result||The device that reported the DLP event.|
|dvc_bunit||-||Automatically assigned by Splunk||The business unit of the DLP target.|
|dvc_category||-||Automatically assigned by Splunk||The category of the DLP device.|
|dvc_priority||-||Automatically assigned by Splunk||The priority of the DLP device.|
|dvc_zone||-||-||The zone of the DLP device.|
|object||matchedValue||The matched data detected by the alert||The name of the affected object.|
||The category of the affected object.|
|object_path||matchedValue||The matched data detected by the alert||The path of the affected object.|
|severity||sensitivityScore||A number between 0 and 1 reflecting the sensitivity of the information detected, where 1 is most sensitive. Not calculated for all results - "unknown" if not available||The severity of the DLP event.|
|signature||resultId||The ID of the result. Note that a single result may generate multiple events for each matched value||The name of the DLP event.|
|src||postSourceUrl||The URL of the post where the match was detected, if available||The source of the DLP event.|
|src_bunit||-||Automatically assigned by Splunk||The business unit of the DLP source.|
|src_category||-||Automatically assigned by Splunk||The category of the DLP source.|
|src_priority||-||Automatically assigned by Splunk||The priority of the DLP source.|
|src_user||author||The username of the person who posted the data, or "Unknown"||The source user of the DLP event.|
|src_user_bunit||-||Automatically assigned by Splunk||The business unit of the DLP source user.|
|src_user_category||-||Automatically assigned by Splunk||The category of the DLP source user.|
|src_user_priority||-||Automatically assigned by Splunk||The priority of the DLP source user.|
|src_zone||-||-||The zone of the DLP source.|
|tag||-||Automatically assigned by Splunk||This automatically generated field is used to access tags from within datamodels.|
|user||-||-||The target user of the DLP event.|
|user_bunit||-||Automatically assigned by Splunk||The business unit of the DLP user.|
|user_category||-||Automatically assigned by Splunk||The category of the DLP user.|
|user_priority||-||Automatically assigned by Splunk||The priority of the DLP user.|
|vendor_product||"Skurio:BreachAlert"||Constant value||The vendor and product name of the DLP system.|
The BreachAlert App logs errors and informational messages to the _internal index. Use the following search to explore the logs from BreachAlert
index="_internal" execprocessor breachalert
If you have any problems, please contact firstname.lastname@example.org
1.0.2 release notes:
- Improved error handling
- Log and continue on errors when fetching using override_timeframe
- Support for inputs using different API and App keys on the same instance
- Fix paging through large numbers of alerts
- Handle alerts of type "cards"
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.