heroui logo

TCC Bypass via Mounted APFS Snapshot Access

Elastic Detection Rules

View Source
Summary
The rule identifies potential misuse of the `mount_apfs` command on macOS systems, specifically when it is invoked with the flags to access APFS snapshots as read-only and without owner permissions. This action allows adversaries to bypass Apple's Transparency, Consent, and Control (TCC) framework, potentially accessing sensitive user files protected under this framework. The rule uses KQL to query logs from the Elastic platform, targeting instances where the command is executed with specific parameters indicative of malicious intent. The risk score is set at 73, highlighting the severity of accessing sensitive files in this manner. To effectively implement this rule, systems must be integrated with Elastic Defend, ensuring that data is correctly monitored and reported to the Elastic Security application. The setup requires a Fleet Server configuration and proper installation of the Elastic Agent on macOS systems. Mitigation strategies include isolating affected systems, terminating suspicious processes, reviewing logs to detect data exfiltration, and updating system software to defend against vulnerabilities.
Categories
  • Endpoint
  • macOS
  • Cloud
Data Sources
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1006
Created: 2020-01-04