
Summary
This detection rule identifies attempts to bypass macOS privacy controls by directly modifying the Transparency, Consent, and Control (TCC) SQLite database using 'sqlite3' processes. The TCC database regulates application permissions for sensitive resources such as the camera, microphone, address book, and calendar. Unlawful modifications can indicate malicious activity aiming to compromise user privacy and security. This rule monitors processes initiating `sqlite3`, specifically targeting the path to the TCC database (`/Library/Application Support/com.apple.TCC/TCC.db`), while excluding legitimate security software interactions to minimize false positives. It leverages Elastic Defend to obtain data from monitored endpoints and uses EQL (Event Query Language) to issue queries concerning process initiation over a defined time frame. A risk score of 47 suggests medium severity for the identified threats, which could signal a significant privacy breach if not addressed promptly. An effective investigation strategy is outlined, advising monitoring of process arguments, parent process verification, user account history checks, and anomaly detection in TCC permissions.
Categories
- macOS
- Endpoint
Data Sources
- Process
- Command
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-12-23