
Summary
The `CrowdStrike MacOS plutil Usage` detection rule is designed to identify the execution of the `plutil` command, which is used to manipulate property list (plist) files on macOS systems. Attackers often leverage plist files to maintain persistence after compromise, as these files can be configured to run at startup, granting malicious actors continued access. The rule focuses on command line activities involving `plutil`, specifically looking for commands that modify plist files. It uses CrowdStrike's FDREvent log type to track events and establishes conditions for triggering alerts based on specific command line actions associated with `plutil`. This analysis provides essential visibility into potential unauthorized modifications, helping organizations enhance their security posture against persistence tactics often employed in attacks.
Categories
- macOS
- Endpoint
Data Sources
- Command
- Process
- Application Log
Created: 2023-06-22