Loading

macOS Security Software Discovery via Grep

Identifies the use of grep to discover known third-party macOS security tools, such as antivirus software or host firewalls. This reconnaissance activity is commonly performed by malware to identify security products before proceeding with malicious actions.

Rule type: eql
Rule indices:

  • logs-endpoint.events.process-*

Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: ?
References:

Tags:

  • Domain: Endpoint
  • OS: macOS
  • Use Case: Threat Detection
  • Tactic: Discovery
  • Data Source: Elastic Defend

Version: ?
Rule authors:

  • Elastic

Rule license: Elastic License v2

process where host.os.type == "macos" and event.type == "start" and
  ((process.name in ("grep", "egrep", "pgrep")) or
   (process.name in ("bash", "sh", "zsh") and process.args == "-c")) and
  process.args in ("Little Snitch", "CbOsxSensorService", "CbDefense", "ESET", "Littlesnitch",
                   "elastic-endpoint", "falcond", "SentinelOne", "lulu", "WhatsYourSign",
                   "KnockKnock", "reikey", "OverSight", "KextViewr", "blockblock",
                   "Netiquette", "processmonitor", "filemonitor") and
  not process.parent.executable like "/Library/Application Support/*"
		

Framework: MITRE ATT&CK