Monitoring for account takeover with the Splunk App for Fraud Analytics
If you have not already installed the Splunk App for Fraud Analytics, complete the steps in the deployment guide and then come back to this article.
The information in this article applies to Splunk Enterprise Security (ES) versions 7.x. If you have upgraded to Splunk Enterprise Security version 8.x, some terminology and steps might not apply. For additional assistance on this use case with ES 8.x, Splunk Professional Services can help.
Analysts need to be able to identify when a legitimate customer account is taken over by a malicious actor with the intent to commit fraud. The Splunk App for Fraud Analytics ships with out-of-the-box use cases that address both new account and account takeover fraud, along with limited support for some additional fraud use cases. This process will address how to detect the account takeover fraud use case within the out-of-the-box constraints of the application.
Data required
Identify the risk rules applicable to account takeover fraud
- After performing the initial configuration of the Splunk App for Fraud Analytics, as described in the deployment guide, navigate to Enterprise Security > Configure > Content Management.
- Filter on the following:
- Type: Correlation Search
- App: Fraud Analytics for Splunk
- Filter: 'RR-Fraud --'
- The following results should appear:
.png?revision=1)
- Examine the SPL for each of the applicable searches to determine data source requirements. Currently, all detections applicable to account takeover fraud require data from the
fraud_webdata model. If you add new detections that require another data type, this should be noted for future steps.
Review and prepare data for compliance with the fraud_web data model
The fraud_web data model focuses on account activity such as login/logout, payment and trading activity, or profile changes, and allows analysts to search for and detect potentially fraudulent account behavior. The data could be in the form of web or other application-like data, but focuses on data fields rather than specific data types. So, theoretically, both the fraud_account and fraud_web data models could leverage the same source type. The difference is how they focus different lenses on this data through specific fields within the data models.
- Review the applicable data fields for the
fraud_webdata model by navigating to Settings > Data Models > fraud_account. Thefraud_accountdata model applicable fields can be seen in the table in Splunk Docs. - While the above fields are all of the fields available to you through the
fraud_webdata model, similar to how most Splunk Enterprise Security detections work, you won't need to normalize to every single field. You only need to normalize to the fields applicable to the account takeover risk rules described in the previous step. Following are the fields required for successful implementation of the account takeover risk rules described in the previous step.Fields required for risk rule implementation
Risk Rule Required Fields Combined Required Fields RR-Fraud -- Brute force attack on user logged_inusername_triedsrc_ip
actionCountryip_subnet_16slanguageslogged_inRegionsession_idsrc_ipusernameusernamesusername_tried
RR-Fraud -- Country of login doesn't match browser language Countrylanguagesusernamessession_id
RR-Fraud -- Excessive Logins - group behavior usernameusernames
RR-Fraud -- IP hitting multiple user accounts username_triedsrc_ip
RR-Fraud -- Significant edit user profile followed by quick money movement actionsession_idusernames
RR-Fraud -- Successful logins from different regions CountryRegionip_subnet_16susername
RR-Fraud -- Successful logins from multiple ip addresses logged_inip_subnet_16src_ipusernameusername_tried
RR-Fraud -- Suspicious attempts to login to high value accounts username_triedusernamesrc_ip
Fields required for dashboard implementation
Dashboard Panel Required Fields Combined Required Fields Financial Fraud > Web Traffic Analysis Combined timechart of all events _time_timeactionsrc_ipCountryRegionCityusername_exusername_triedlogged_inaccept_languagehttp_user_agenthttp_methodrisk_exposurerisk_exposure_rscreenscreenssession_idstatusuriuri_path
Selected events _timeMulti-field investigative panel (all views) bytes_inCountryRegionsrc_ipusername_triedlogged_inaccept_languagehttp_methodstatushttp_user_agenturi_path
Detailed web traffic activity _timesrc_ipCountryRegionCityusername_triedlogged_inaccept_languagehttp_user_agenthttp_methodstatusuri_path
Financial Fraud > Fraud Risk Exposure Analysis Money Movement Events actionInteractive investigation: User accounts and risk analysis (Countries) src_ipusername_exCountry
Interactive investigation: User accounts and risk analysis (Usernames) risk_exposuresrc_ipusername_ex
Interactive investigation: User accounts and risk analysis (IP Addresses) username_exhttp_user_agentrisk_exposureCountry
Interactive investigation: User accounts and risk analysis (Screen Info) username_exrisk_exposurescreens
Interactive investigation: User accounts and risk analysis (Session ID) risk_exposuresession_id
Interactive investigation: User accounts and risk analysis (User Agent) risk_exposurehttp_user_agent
Interactive investigation: User accounts and risk analysis (Risk Level) username_exrisk_exposure_r
Interactive investigation: User accounts and risk analysis (Actions) actionDetailed portal activity _timesrc_ipCountryRegionCitysession_idusername_exscreenhttp_methodstatusactionuririsk_exposurehttp_user_agent
- Identify the fields within the applicable dataset, and normalize those to the
fraud_webdata model. - If you need to adjust out-of-the-box risk rules based on your unique requirements, keep note of any additional fields that need to be normalized to the
fraud_webdata model and incorporated into the detection.
Enable the risk rules and risk notable applicable to account takeover fraud
- Enable the Risk Rules identified in the first step in this process by navigating to Enterprise Security > Configure > Content Management, and first filtering for the new account fraud risk rules.
- Type: Correlation Search
- App: Fraud Analytics for Splunk
- Filter: 'RR-Fraud --'
- Enable all of these rules through the Content Management user interface.
- Enable the following Risk Notables:
- Notable-Fraud -- Possible Account Takeover Attack
- Risk Threshold Exceeded for User - all channels
Next steps
If you want more step-by-step guidance about how to implement this use case by walking through a sample scenario, see the Multichannel fraud detection article.
After you have implemented this account takeover use case, you might be interested in other ways to protect your financial services organization and its customers. Return to the fraud detection and prevention deployment guide for instructions on implementing additional use cases.
Finally, if you would like more hands-on assistance with this or any other fraud detection and protection use case, Splunk Professional Services can help. Find more information here or reach out directly to sales.

