
Summary
This detection rule focuses on identifying the use of network sniffing tools, specifically for macOS environments. Network sniffing is a technique used by malicious actors to intercept and analyze network traffic, potentially leading to data breaches. The rule targets specific processes typically associated with network monitoring and packet capturing, such as 'tcpdump' and 'tshark'. These tools can be employed by adversaries to enable passive interception of sensitive information transmitted over the network. The rule operates by monitoring process creation events and evaluates if the executed process corresponds with the identified sniffing tools. Given its level of informational severity, while it does indicate potential malicious activity, legitimate usage for administration purposes may also trigger alerts, hence the noted false positives. This rule is crucial for bolstering visibility within macOS systems to counteract unauthorized network observation and mitigate related threats.
Categories
- macOS
- Network
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1040
Created: 2020-10-14