
Summary
The 'Security Software Discovery via Grep' detection rule identifies instances where the `grep` command is used to query the installed security software on macOS and Linux systems. Its purpose is to highlight potential reconnaissance activities by attackers who may check for antivirus and firewall applications on compromised hosts. The detection rule triggers alerts when the command is executed by non-root users and employs specific arguments that suggest an analysis of security tools is being conducted. Investigators are advised to analyze the process execution chain and other related alerts within a 48-hour timeframe to determine if the activity was legitimate or indicative of a potential threat. False positives may arise from benign endpoint security installations, and any discoveries should not be immediately categorized as malicious if no suspicious behavior is detected.
Categories
- Endpoint
- macOS
- Linux
Data Sources
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1518
- T1518.001
Created: 2020-12-20