
Summary
The `CrowdStrike MacOS Osascript as Administrator` detection rule is designed to identify the execution of the `osascript` command with administrator privileges on MacOS systems. This behavior can be indicative of malicious activities, as it allows scripts to interact with system-level settings and applications, potentially leading to system compromise or unauthorized access to sensitive information. The rule utilizes logs from CrowdStrike's Falcon Data Replicator Events to monitor command-line invocations of `osascript` and assess their permission levels. Specifically, it defines test cases to verify whether `osascript` is run with admin rights (expected result is true) and without (expected result is false). With a medium severity rating, this rule is part of a broader security strategy that aims to detect possible abuse of MacOS administrative features by threat actors.
Categories
- macOS
- Endpoint
- Cloud
- Infrastructure
- Application
Data Sources
- Process
- Container
- User Account
Created: 2023-06-22