New

The executive guide to generative AI

Read more

Authorization Plugin Modification

edit

Authorization plugins are used to extend the authorization services API and implement mechanisms that are not natively supported by the OS, such as multi-factor authentication with third party software. Adversaries may abuse this feature to persist and/or collect clear text credentials as they traverse the registered plugins during user logon.

Rule type: query

Rule indices:

  • auditbeat-*
  • logs-endpoint.events.*

Severity: medium

Risk score: 47

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References:

Tags:

  • Elastic
  • Host
  • macOS
  • Threat Detection
  • Persistence

Version: 3 (version history)

Added (Elastic Stack release): 7.12.0

Last modified (Elastic Stack release): 8.4.0

Rule authors: Elastic

Rule license: Elastic License v2

Rule query

edit
event.category:file and not event.type:deletion and
file.path:(/Library/Security/SecurityAgentPlugins/* and not
/Library/Security/SecurityAgentPlugins/TeamViewerAuthPlugin.bundle/*)
and not process.name:shove and process.code_signature.trusted:true

Threat mapping

edit

Framework: MITRE ATT&CKTM

Rule version history

edit
Version 3 (8.4.0 release)
  • Updated query, changed from:

    event.category:file and not event.type:deletion and
    file.path:(/Library/Security/SecurityAgentPlugins/* and not /Library
    /Security/SecurityAgentPlugins/TeamViewerAuthPlugin.bundle/Contents/*)
Was this helpful?
Feedback