
Summary
This rule is designed to detect enumeration of local system accounts on macOS by monitoring process creation activities. The detection focuses on specific command-line tools that are commonly used for enumerating user accounts, such as `dscl`, `dscacheutil`, `cat`, and others. Each selection in the detection clauses specifies a unique command pattern, allowing the rule to trigger on any one of them. Selection criteria include checks for command line arguments that pertain to user listings and privileged files like `/etc/passwd` and `/etc/sudoers`. False positives may arise during legitimate administrative activities, as system administrators could legitimately run these commands to gather information about user accounts. With a low severity level, this rule emphasizes general monitoring rather than indicating an immediate threat.
Categories
- macOS
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1087.001
Created: 2020-10-08