heroui logo

Gatekeeper Override and Execution

Elastic Detection Rules

View Source
Summary
This detection rule monitors for the circumvention of macOS Gatekeeper, which is a security feature designed to prevent unauthorized applications from executing on macOS systems. The rule triggers when a file's quarantine attribute is removed—indicating it may come from an untrusted source—and subsequently executed. Such behavior usually signals an attempt to bypass security protocols and execute potentially harmful software. The rule effectively captures situations where files are removed from quarantine and executed immediately, often stemming from typical download directories such as Downloads, Desktop, and temporary files. It involves querying specific actions noted by the event logs and aims to identify potentially malicious activities that leverage common behavior patterns of threat actors. The analysis guide provided within the rule outlines steps for investigation, possible false positives due to legitimate user activity, and recommends immediate remediation actions like quarantining or deleting suspicious files, conducting malware scans, and enhancing user awareness regarding security protocols.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
  • File
  • Network Traffic
  • Application Log
  • User Account
ATT&CK Techniques
  • T1562
  • T1562.001
  • T1553
  • T1553.001
Created: 2026-01-30