
Summary
This detection rule monitors access to the '/Library/Preferences/com.apple.TimeMachine.plist' file on macOS systems, which can indicate attempts to exploit Full Disk Access (FDA) permissions. The rule is designed to capture any suspicious reads of this preferences file, as malware often checks this file to confirm if it possesses FDA privileges. The detection is configured for events where the file is opened, and evaluates the processes executing these actions. Notably, common scripting environments such as Python, Ruby, and Bash are flagged, along with any processes that are either untrusted or lack a code signature. The rule provides guidance for further investigation, including process lineage checks and correlation with network activity, to accurately diagnose potential threats. It also outlines common false positives and response steps to mitigate risks such as isolating affected systems and revoking suspicious privileges.
Categories
- macOS
- Endpoint
Data Sources
- File
- Process
ATT&CK Techniques
- T1083
- T1548
- T1548.006
Created: 2026-01-30