Loading

Screen Capture Access Denied via TCC

Detects a denied Screen Capture request via macOS Unified Logs TCC telemetry. The com.apple.TCC subsystem logs access decisions for protected resources. When the kTCCServiceScreenCapture service appears with auth_value=0, it indicates an application was denied permission to capture the screen. macOS stealers and spyware commonly attempt screen capture to exfiltrate sensitive information displayed on screen. While legitimate screen sharing and conferencing applications may also trigger denials during initial setup, this event should be investigated in combination with other suspicious activity. This detection leverages the com.apple.TCC subsystem with category access and does not require private data enablement.

Rule type: esql
Rule indices:

Rule Severity: low
Risk Score: 21
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: 100
References:

Tags:

  • Domain: macOS
  • Data Source: macOS Unified Logs
  • Data Source: Unified Logs
  • Use Case: Threat Detection
  • Resources: Investigation Guide
  • Tactic: Collection
  • Rule Type: BBR

Version: 1
Rule authors:

  • Elastic

Rule license: Elastic License v2

This rule detects when an application is denied Screen Capture permission by macOS TCC. The kTCCServiceScreenCapture service controls which applications can capture the contents of the screen.

  • Review the message field to extract the process identity (bundle ID, binary path, PID) of the denied application.
  • Correlate the denied process with Elastic Defend telemetry to determine how the process was launched and its parent chain.
  • Check if the application is a known screen sharing or conferencing tool, or if it is unexpected on the host.
  • Look for related TCC denials (e.g., camera, microphone) from the same process, which may indicate spyware behavior.
  • Check for preceding Apple Event activity such as syso,exec or syso,dlog that may indicate the screen capture attempt was part of a stealer payload.
  • Zoom, Microsoft Teams, Slack, Google Meet, and other conferencing tools commonly trigger screen capture denials before being granted access.
  • Screen recording and screenshot utilities will trigger these events.
  • Remote desktop and IT support tools may generate denials during initial deployment.
  • If the denied application is unknown or suspicious, isolate the host and investigate the process.
  • Review whether the application has other suspicious behaviors (network connections, file access, clipboard access).
  • Check for data exfiltration indicators if the application was recently granted screen capture access.
FROM logs-unifiedlogs.unifiedlogs-* METADATA _id, _version, _index
| WHERE event.dataset == "unifiedlogs.log" AND host.os.type == "macos" AND unified_log.subsystem == "com.apple.TCC"
  AND unified_log.category == "access"
  AND message LIKE "*kTCCServiceScreenCapture*"
  AND message LIKE "*Handling access request*"
  AND NOT message LIKE "*Allowed*"
| KEEP @timestamp, _id, _version, _index, host.name, host.id, host.os.type, event.dataset, unified_log.subsystem, unified_log.category, message
		

Framework: MITRE ATT&CK