heroui logo

Suspicious Apple Mail Rule Plist Modification

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify unusual modifications to the Apple Mail "SyncedRules.plist" file, which stores user-defined email rules. Modifications by non-Mail applications can signify an attacker establishing a persistence mechanism, where they manipulate these rules to execute arbitrary scripts triggered by incoming email. The rule functions by analyzing file events within the targeted plist file, filtering out legitimate modifications made by authorized processes associated with Apple Mail and identifying unauthorized alterations that could indicate malicious activity. It includes an investigation guide proposing various analysis steps, including checking the legitimacy of the modifying application, comparing file versions, and investigating any scripts referenced by the modified rules. It outlines specific response and remediation tactics for incident responders, emphasizing the importance of isolating compromised systems and conducting thorough forensic analyses to prevent exploitation.
Categories
  • Endpoint
  • macOS
Data Sources
  • File
ATT&CK Techniques
  • T1546
  • T1204
Created: 2026-01-30