heroui logo

JAMF MDM Potential Suspicious Child Process

Sigma Rules

View Source
Summary
The rule detects potentially suspicious child processes spawned from the Jamf executable on macOS systems. Specifically, it looks for child processes that terminate in bash or sh, initiated by a parent process named 'jamf'. This could indicate misuse of Jamf as a command and control (C2) server, similar to the behavior associated with Typhon MythicAgent, a known malicious tool. Administrators should be cautious as the presence of legitimate custom scripting by Jamf administrators may generate false positives. It is advisable to apply additional contextual filters to refine detection results.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
Created: 2023-08-22