
Summary
This detection rule identifies attempts to disable security tools on macOS systems. The rule focuses on monitoring process creation events and checks for specific command-line actions that suggest commonly employed methods for disabling security software. Key detection mechanisms include monitoring for the unloading of services using the 'launchctl' command, examination of changes to important property lists associated with security tools (such as those for Lulu, BlockBlock, and Carbon Black), and checks for the disabling of Gatekeeper through specific command-line uses of 'spctl'. By analyzing these behaviors, the rule encapsulates a methodical approach to detecting potential defense evasion tactics employed by attackers in a macOS environment.
Categories
- macOS
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1562.001
Created: 2020-10-19