heroui logo

Execution with Explicit Credentials via Scripting

Elastic Detection Rules

View Source
Summary
This rule is designed to detect the execution of the security_authtrampoline process in macOS environments through various scripting interpreters, indicating a potential privilege escalation attempt using explicit logon credentials. The security_authtrampoline process is invoked when programs utilize the AuthorizationExecuteWithPrivileges function from the Security.framework to execute another program with root privileges. Given that this process should not run independently, its execution in conjunction with common scripting languages (like osascript, bash, python, etc.) raises a red flag for potentially unauthorized activities. The detection rule monitors events across endpoint data to flag instances where security_authtrampoline is started, providing security analysts the opportunity to investigate possible misuse of credentials and subsequent escalated privileges. The alert generation ensures that organizations can proactively address potential threats associated with unauthorized access and privilege exploitation.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1078
  • T1548
  • T1548.004
  • T1059
Created: 2020-12-07