macOS Security Software Discovery via Grep
Identifies the use of grep to discover known third-party macOS security tools, such as antivirus software or host firewalls. This reconnaissance activity is commonly performed by malware to identify security products before proceeding with malicious actions.
Rule type: eql
Rule indices:
- logs-endpoint.events.process-*
Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: ?
References:
Tags:
- Domain: Endpoint
- OS: macOS
- Use Case: Threat Detection
- Tactic: Discovery
- Data Source: Elastic Defend
Version: ?
Rule authors:
- Elastic
Rule license: Elastic License v2
process where host.os.type == "macos" and event.type == "start" and
((process.name in ("grep", "egrep", "pgrep")) or
(process.name in ("bash", "sh", "zsh") and process.args == "-c")) and
process.args in ("Little Snitch", "CbOsxSensorService", "CbDefense", "ESET", "Littlesnitch",
"elastic-endpoint", "falcond", "SentinelOne", "lulu", "WhatsYourSign",
"KnockKnock", "reikey", "OverSight", "KextViewr", "blockblock",
"Netiquette", "processmonitor", "filemonitor") and
not process.parent.executable like "/Library/Application Support/*"
Framework: MITRE ATT&CK
Tactic:
- Name: Discovery
- Id: TA0007
- Reference URL: https://attack.mitre.org/tactics/TA0007/
Technique:
- Name: Software Discovery
- Id: T1518
- Reference URL: https://attack.mitre.org/techniques/T1518/
Sub Technique:
- Name: Security Software Discovery
- Id: T1518.001
- Reference URL: https://attack.mitre.org/techniques/T1518/001/