
Summary
The rule 'Potential Persistence via Periodic Tasks' identifies the creation or modification of periodic task configuration files in macOS, which adversaries may exploit to execute unauthorized code or gain persistent access. The detection targets file activities looking for specific paths associated with periodic tasks and ignores deletion events. This is crucial for early detection of potential misuse that could indicate an intrusion or an attempt to establish persistence by malicious actors. The rule sets a low-risk score of 21, emphasizing its importance in monitoring scheduled tasks that could serve as a vector for threat actors. Integrating Elastic Defend in the environment allows monitoring of these activities, with a thorough investigation guide provided for analysts to assess the significance of alerts generated by this rule.
Categories
- macOS
- Endpoint
Data Sources
- File
- Application Log
- Process
ATT&CK Techniques
- T1053
- T1053.003
Created: 2021-01-21