heroui logo

Attempt to Disable Gatekeeper

Elastic Detection Rules

View Source
Summary
This rule, authored by Elastic, aims to detect attempts to disable Gatekeeper on macOS, a critical security feature that ensures only trusted software runs. Adversaries may try to disable Gatekeeper to run malicious code without authorization. The rule utilizes a KQL (Kibana Query Language) query to monitor process events, specifically looking for the command 'spctl --master-disable'. The detection mechanism focuses on process events categorized as 'start' or 'process_started', filtering specifically for those instances on macOS that show the aforementioned command. The severity level set is medium, indicating the significance of the potential threat. It also includes a setup guide that necessitates the integration of Elastic Defend through the Elastic Agent, which has to be configured in Fleet. Additionally, the rule's content reflects best practices for triaging and analyzing incidents, examining user data associated with the command execution, and investigating related processes and events to understand the context of the attempted security breach. The recommended response includes isolating affected systems, terminating suspicious processes, and reviewing system logs for any unauthorized activities.
Categories
  • macOS
  • Endpoint
  • Other
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T2024
  • T1553
Created: 2021-01-11