
Summary
This rule is designed to detect the unauthorized deletion of local audit logs on macOS systems, which can be an indicator of attempts to cover up malicious activity. Specifically, it looks for the use of commands that are commonly associated with file deletion, such as 'rm', 'unlink', and 'shred'. The detection logic checks for process creation events where the command line includes paths typically associated with system and user logs, such as '/var/log' and '/Users/'. The presence of these commands, combined with references to log directories, suggests a potential threat where an attacker may be attempting to eliminate traces of their activities on the host. Given that legitimate administrative tasks may also involve clearing logs, the rule acknowledges potential false positives.
Categories
- macOS
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1070.002
Created: 2020-10-11