
Summary
This rule is designed to detect potential password collection activities via the shell on macOS systems. Threat actors, including those utilizing malware like Atomic Stealer, may exploit the macOS shell to execute commands that prompt users to input their passwords. This behavior often involves calling the System Preferences utility or directly requesting sensitive information through GUI prompts. The rule specifically scans for shell executions that either reference 'system preferences' or include 'password' in their command arguments. By identifying processes that match these criteria, the detection can highlight potentially malicious actions that aim to capture passwords or other sensitive input from users. The detection logic operates by retrieving endpoint data and searching for shell executions while appending conditions to refine the identification of suspicious processes. This rule plays a critical role in enhancing the security posture of macOS environments by spotting and alerting on these tactics before any actual data compromise occurs.
Categories
- macOS
- Endpoint
- Application
- Identity Management
Data Sources
- Process
- Command
- User Account
ATT&CK Techniques
- T1056.002
Created: 2024-11-22