heroui logo

Persistence via DirectoryService Plugin Modification

Elastic Detection Rules

View Source
Summary
The detection rule focuses on monitoring for the modification or creation of DirectoryService PlugIns (dsplug files) on macOS systems. The rule is designed to identify potential persistence mechanisms employed by adversaries, as these plugins are critical for managing directory services and execute during system startup. The Elasticsearch detection rule utilizes KQL to filter events that involve non-deletion actions against specific dsplug files located in `/Library/DirectoryServices/PlugIns/`. A risk score of 47 indicates a medium severity level for potential threats detected by this rule. Moreover, it emphasizes the importance of proper integration within Elastic's security framework to ensure timely data collection from the monitored endpoint. In particular, the rule is predicated on the Elastic Defend integration, implying that affected systems must have Elastic Agent deployed to capture relevant events. The setup instructions outline the necessary steps to configure the integration appropriately on a macOS device, ensuring comprehensive monitoring of potentially malicious activities. This detection rule serves as a valuable security measure, empowering organizations to thwart potential persistence tactics and maintain control over their endpoint systems.
Categories
  • Endpoint
  • macOS
Data Sources
  • File
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1547
Created: 2021-01-13