
Summary
This detection rule is designed to identify suspicious discovery activities on macOS systems that utilize the 'find' command. The rule specifically looks for instances where the 'find' binary is executed with command-line arguments that suggest an attempt to locate executables or files with potentially unsafe permissions. The parameters '-perm -4000', '-perm -2000', '-perm 0777', and others are indicative of targeted searches for files that could be leveraged for privilege escalation or vulnerable binaries. By monitoring process creation for these command line patterns, the rule helps in detecting possible malicious activities attempting to compromise system integrity or privacy. The rule is essential for security monitoring on macOS systems, enabling administrators to react promptly to potential exploitation attempts.
Categories
- macOS
- Endpoint
Data Sources
- Process
Created: 2022-12-28