heroui logo

MacOS Emond Launch Daemon

Sigma Rules

View Source
Summary
This rule detects potential malicious modifications to the Emond Launch Daemon on macOS. The Emond daemon is used for managing event notifications for various system-level events. Adversaries may exploit it by adding or modifying configuration files (plist files) within the Emond rules directory (/etc/emond.d/rules/) or client directory (/private/var/db/emondClients/) to maintain persistence and potentially escalate privileges. The rule specifically looks for file event logs that indicate the creation or modification of these plist files and checks if the file paths match the sensitive directories as described. This detection mechanism can help in identifying unauthorized changes that could be indicative of an adversary trying to maintain control over a compromised system.
Categories
  • macOS
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1546.014
Created: 2020-10-23