
Summary
This analytic rule is designed to detect the usage of the `plutil` command on macOS systems, which is used to modify property list (plist) files. The rule leverages the osquery framework to monitor process events and specifically tracks command executions of `/usr/bin/plutil`. This activity can indicate a potential security threat, as adversaries may exploit `plutil` to alter plist files, possibly injecting malicious binaries or arguments that could execute on user logon or system startup. Such actions may lead to persistence mechanisms, arbitrary code execution, or privilege escalation, which can significantly compromise system security. By analyzing logged process execution data, this detection aims to flag potentially malicious usage while allowing for a review of legitimate administrative activities.
Categories
- macOS
- Endpoint
Data Sources
- Script
- Process
ATT&CK Techniques
- T1647
Created: 2024-11-13