
Summary
This detection rule, authored by Elastic, focuses on identifying potential persistence mechanisms through modifications made to the `init.coffee` file in the Atom text editor on macOS. Adversaries may exploit this file by injecting malicious JavaScript that executes whenever Atom starts. The rule is defined within a specific time frame of the past 9 months and utilizes a KQL (Kibana Query Language) query to highlight modifications that are not associated with benign processes like Atom itself or the root user. A risk score of 21 indicates a low threat level, but the impact could be significant in terms of persistence and unauthorized system access if exploited. The setup process emphasizes the importance of the Elastic Defend integration to monitor file events accurately. The investigation guide provides a detailed approach for security analysts to assess modifications, identifying unusual activities related to user accounts and correlated events potentially indicating an ongoing intrusion. Additionally, the rule covers potential false positive scenarios related to legitimate modifications by users and necessary responses if malicious alterations are discovered.
Categories
- macOS
- Endpoint
- Application
- Identity Management
Data Sources
- File
- Application Log
- Network Share
ATT&CK Techniques
- T1037
Created: 2021-01-21