
Summary
The rule titled 'Suspicious Web Browser Sensitive File Access' is designed to detect unauthorized access to sensitive files used by web browsers on macOS systems. Specifically, it monitors for file access events where an untrusted or unsigned process attempts to open files containing credentials, such as cookies and login data. Adversaries often leverage these files to steal user credentials by accessing them through non-legitimate means. This rule employs EQL (Event Query Language) to filter events from Elastic Defend, looking for specific file names (e.g., cookies.sqlite, logins.json) accessed by processes that either lack trusted code signatures or are identified as 'osascript', which can indicate malicious activity. Given its high severity and risk score of 73, this rule is crucial for preventing credential theft on macOS environments, particularly by flagging risky behaviors associated with file manipulations that could point to credential gathering threats. The rule also includes guidance for investigating alerts and potential false positives, establishing a comprehensive approach to managing such security incidents.
Categories
- Endpoint
- macOS
Data Sources
- File
- Process
- User Account
ATT&CK Techniques
- T1539
- T1555
- T1555.003
Created: 2020-01-04