heroui logo

Potential Persistence via Login Hook

Elastic Detection Rules

View Source
Summary
This rule, titled 'Potential Persistence via Login Hook', aims to detect potential unauthorized modifications of the login window property list (plist) file (`com.apple.loginwindow.plist`) on Mac OS X systems. An adversary can alter this plist file as a tactic to ensure that certain applications or scripts are executed during user login or system boot, which is a common method for establishing persistence on a compromised endpoint. The rule utilizes the `kuery` language to query logs from `logs-endpoint.events.*` index to identify such modifications while excluding legitimate processes that may also interact with the plist file. The risk score for this detection mechanism is set at 47, indicating a moderate level of threat, and the rule suggests a specific setup using the Elastic Defend integration via Fleet, which is essential for monitoring the relevant event data needed for the detection. Mitigation strategies should involve closely monitoring systems for unauthorized plist changes and maintaining comprehensive logging and alerting mechanisms against such behaviors.
Categories
  • macOS
  • Endpoint
Data Sources
  • File
  • Logon Session
  • Application Log
  • Process
ATT&CK Techniques
  • T1547
  • T1647
Created: 2021-01-21