heroui logo

Suspicious Child Process of Adobe Acrobat Reader Update Service

Elastic Detection Rules

View Source
Summary
This detection rule aims to identify potential exploitation attempts related to the Adobe Acrobat Reader's PrivilegedHelperTool, which is responsible for handling updates. By focusing on specific events in the process lifecycle, the rule detects any suspicious child processes spawned by the Adobe update service, particularly those running under the 'root' user and not matching known legitimate executables. The rule is informed by vulnerabilities documented in CVE-2020-9613, CVE-2020-9614, and CVE-2020-9615. To function effectively, this rule requires integration with Elastic Defend, which monitors endpoint activities on macOS systems. The risk score of 73 indicates a high potential threat, and false positives are possible from legitimate Adobe processes. The rule leverages queries that encompass unexpected behavior in the update service's child process execution, providing alerts for thorough investigation. Recommended actions involve immediate isolation of the affected system, review of system logs, and application of necessary security patches to mitigate vulnerabilities.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
  • Application Log
  • File
ATT&CK Techniques
  • T1068
Created: 2021-01-19