
Summary
This detection rule identifies potentially suspicious actions involving the manipulation of the firmware password on macOS systems. It focuses on the `/usr/sbin/firmwarepasswd` command, which is responsible for setting, deleting, or checking the firmware password on Macs. Such actions can point to malicious attempts to bypass system security features, especially in environments where firmware passwords are critical for protecting hardware configurations. Additionally, it's important to note that this command has been disabled on silicon-based Apple computers, limiting its effectiveness in newer macOS devices. The use of specific command line parameters, such as 'setpasswd', 'full', 'delete', or 'check', serves as indicators for triggering alerts under this rule. Administrators should be cautious to filter out legitimate administrative activities to minimize false positives.
Categories
- macOS
- Endpoint
Data Sources
- Process
Created: 2021-09-30