
Summary
The detection rule, titled 'Suspicious Curl to Jamf Endpoint', is designed to identify potentially malicious curl requests directed at Jamf Pro endpoints originating from unusual or suspicious processes within an enterprise's macOS environment. It leverages a query specified in EQL (Elastic Query Language) to monitor processes for signs of lateral movement that may signify the abuse of compromised Jamf credentials. The rule specifically looks for instances where either unsigned binaries or certain scripting interpreters initiate these curl requests, which could indicate an actor attempting to exploit Jamf Pro for unauthorized access or control over managed devices. Given the integration of such requests with processes often associated with legitimate Jamf management, this rule plays a crucial role in detecting abnormal behaviors that diverge from expected operational norms. The risk of a score of 73 indicates a high potential impact, warranting urgent attention from security teams, especially considering the threats posed by actors utilizing compromised Jamf credentials to deploy malicious payloads or extract sensitive data from devices.
Categories
- Endpoint
- macOS
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1072
Created: 2026-01-30