
Summary
This detection rule monitors for attempts to modify user group memberships on macOS systems, specifically for adding a user to the admin group using the 'dseditgroup' utility. The rule focuses on the execution of specific command-line arguments that indicate modification of group memberships. By monitoring the creation of processes with command lines containing certain parameters (e.g., ' -o edit ', ' -a ', ' -t user', and 'admin'), it can identify potential unauthorized privilege escalation attempts where a user is granted administrative privileges. Given that such changes could lead to significant security risks, this rule is crucial for detecting and mitigating instances of privilege escalation attacks in macOS environments.
Categories
- macOS
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1078.003
Created: 2023-08-22