heroui logo

Potential Hidden Local User Account Creation

Elastic Detection Rules

View Source
Summary
This threat detection rule identifies attempts to create hidden local accounts on macOS systems, which may indicate attempts by adversaries to establish persistence while evading user attention. The rule looks for specific `dscl` command invocations that set the account property as hidden using arguments like `IsHidden`, `create`, and values indicating true for that property (such as true, 1, or yes). The detection is crucial given the potential misuse of hidden accounts to bypass scrutiny, allowing malicious actors to maintain unauthorized access to systems while remaining stealthy. The rule runs against endpoint logs within a specified timeframe, providing insights into possible account creation activities which could be part of a larger attack strategy designed to exploit valid account privileges. Potential false positives can arise from legitimate administrative actions or third-party applications, necessitating a thorough investigation of any flagged events.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
  • User Account
  • Application Log
  • Script
ATT&CK Techniques
  • T2039
  • T1078
  • T1078.003
Created: 2020-01-05