heroui logo

Suspicious Browser Child Process

Elastic Detection Rules

View Source
Summary
The rule named "Suspicious Browser Child Process" is designed to detect the execution of potentially harmful child processes originating from popular web browsers on macOS systems. This type of detection is crucial as adversaries often exploit browsers to execute malicious commands via scripts or other methods while users interact with websites. The rule utilizes EQL (Event Query Language) to filter process creation events where the parent process is a web browser (e.g., Google Chrome, Firefox, Safari) and the child process is a commonly exploited interpreter or scripting tool (like bash, curl, python). It effectively disregards known legitimate processes and scripts, which reduces false positives. With a configured risk score of 73, this rule emphasizes the high severity of possible threats initiated by browser vulnerabilities. The rule requires data from Elastic Defend and is integrated via Elastic Agent to monitor events on endpoints, making it an effective tool for enhancing the security posture of macOS environments against initial access and execution attacks.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1203
  • T1189
Created: 2020-12-23